{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:55:38Z","timestamp":1725890138786},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_18","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"243-257","source":"Crossref","is-referenced-by-count":0,"title":["On the Detectability of Weak DoS Attacks in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Denise","family":"Dudek","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Dudek, D.: DoS detection with markov chains. In: 9th European Conference on Wireless Sensor Networks (EWSN), Poster and Demo Proceedings (2012)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Dudek, D.: Collaborative detection of traffic anomalies using first order markov chains. In: 2012 Ninth International Conference on Networked Sensing Systems (INSS), pp. 1\u20134 (June 2012)","DOI":"10.1109\/INSS.2012.6240522"},{"key":"18_CR3","volume-title":"Proceedings of the 4th Int. Conf. on Security and Privacy in Communication Netowrks, SecureComm 2008","author":"I. Krontiris","year":"2008","unstructured":"Krontiris, I., Giannetsos, T., Dimitriou, T.: Lidea: a distributed lightweight intrusion detection architecture for sensor networks. In: Proceedings of the 4th Int. Conf. on Security and Privacy in Communication Netowrks, SecureComm 2008, 20:1\u201320:10. ACM, New York (2008)"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1016\/j.comnet.2006.07.008","volume":"51","author":"W.T. Su","year":"2007","unstructured":"Su, W.T., Chang, K.M., Kuo, Y.H.: ehip: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks\u00a051(4), 1151\u20131168 (2007)","journal-title":"Computer Networks"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1145\/1644038.1644072","volume-title":"Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009","author":"D. Dudek","year":"2009","unstructured":"Dudek, D., Haas, C., Kuntz, A., Zitterbart, M., Kr\u00fcger, D., Rothenpieler, P., Pfisterer, D., Fischer, S.: A wireless sensor network for border surveillance. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009, pp. 303\u2013304. ACM, New York (2009)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1288107.1288118","volume-title":"Proceedings of the 8th ACM Int. Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007","author":"R. Wang","year":"2007","unstructured":"Wang, R., Du, W., Ning, P.: Containing denial-of-service attacks in broadcast authentication in sensor networks. In: Proceedings of the 8th ACM Int. Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, pp. 71\u201379. ACM, New York (2007)"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TR.2004.823851","volume":"53","author":"N. Ye","year":"2004","unstructured":"Ye, N., Zhang, Y., Borror, C.: Robustness of the markov-chain model for cyber-attack detection. IEEE Transactions on Reliability\u00a053(1), 116\u2013123 (2004)","journal-title":"IEEE Transactions on Reliability"},{"key":"18_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1824766.1824773","volume":"7","author":"I.C. Paschalidis","year":"2010","unstructured":"Paschalidis, I.C., Chen, Y.: Statistical anomaly detection with sensor networks. ACM Trans. Sen. Netw.\u00a07, 17:1\u201317:23 (2010)","journal-title":"ACM Trans. Sen. Netw."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Gao, Y., Chen, C., Bu, J., Dong, W., He, D.: Icad: Indirect correlation based anomaly detection in dynamic wsns. In: Proceedings of the Wireless Communications and Networking Conference (IEEE WCNC 2011), pp. 647\u2013652 (March 2011)","DOI":"10.1109\/WCNC.2011.5779209"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T12:37:54Z","timestamp":1557491874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}