{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:10:10Z","timestamp":1743984610069,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331664"},{"type":"electronic","value":"9783642331671"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33167-1_9","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T10:07:05Z","timestamp":1345284425000},"page":"145-162","source":"Crossref","is-referenced-by-count":3,"title":["A Probabilistic Framework for Localization of Attackers in MANETs"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Shakarian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Azar, Y., Gamzu, I.: Efficient submodular function maximization under linear packing constraints. The Computing Research Repository (CoRR) (July 2010)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Blumenthal, J., Grossmann, R., Golatowski, F., Timmermann, D.: Weighted centroid localization in zigbee-based sensor networks. In: Proceedings of the IEEE International Symposium on Intelligent Signal Processing (WISP 2007) (October 2007)","DOI":"10.1109\/WISP.2007.4447528"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, T., Li, P., Zhu, S.: An algorithm for jammer localization in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), Fukuoka, Japan (March 2012)","DOI":"10.1109\/AINA.2012.11"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Datta, R., Marchang, N.: Security for Mobile Ad Hoc Networks. In: Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 147\u2013190. Morgan Kaufmann (January 2012)","DOI":"10.1016\/B978-0-12-415815-3.00007-8"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JRPROC.1946.234568","volume":"34","author":"H.T. Friis","year":"1946","unstructured":"Friis, H.T.: A note on a simple transmission formula. Proceedings of the IRE\u00a034(5), 254\u2013256 (1946)","journal-title":"Proceedings of the IRE"},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1517480.1517485","volume":"39","author":"C. Han","year":"2009","unstructured":"Han, C., Zhan, S., Yang, Y.: Proactive attacker localization in wireless LAN. SIGCOMM Computer Communication Review\u00a039(2), 27\u201333 (2009)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/S0022-0000(74)80044-9","volume":"9","author":"D.S. Johnson","year":"1974","unstructured":"Johnson, D.S.: Approximation algorithms for combinatorial problems. Journal of Computer and System Sciences\u00a09, 256\u2013278 (1974)","journal-title":"Journal of Computer and System Sciences"},{"key":"9_CR8","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-20998-7_23","volume-title":"Ubiquitous Computing and Multimedia Applications","author":"Y.-J. Kim","year":"2011","unstructured":"Kim, Y.-J., Song, S.: The Feasibility Study of Attacker Localization in Wireless Sensor Networks. In: Kim, T.-h., Adeli, H., Robles, R.J., Balitanas, M. (eds.) UCMA 2011, Part II. CCIS, vol.\u00a0151, pp. 180\u2013190. Springer, Heidelberg (2011)"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s11276-010-0295-6","volume":"17","author":"H. Liu","year":"2011","unstructured":"Liu, H., Liu, Z., Chen, Y., Xu, W.: Determining the position of a jammer using a virtual-force iterative approach. Wireless Networks\u00a017(2), 531\u2013547 (2011)","journal-title":"Wireless Networks"},{"key":"9_CR10","unstructured":"Liu, H., Xu, W., Chen, Y., Liu, Z.: Localizing jammers in wireless networks. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), Galveston, TX, USA (March 2009)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, USA, pp. 255\u2013265 (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Patwardhan, A., Parker, J., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), Kauai Island, HI, USA, pp. 191\u2013199 (March 2005)","DOI":"10.1109\/PERCOM.2005.38"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33167-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:43:26Z","timestamp":1743983006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33167-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331664","9783642331671"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33167-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}