{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:23:07Z","timestamp":1768720987243,"version":"3.49.0"},"publisher-location":"Dordrecht","reference-count":16,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789048136612","type":"print"},{"value":"9789048136629","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_41","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"239-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Marcus Vin\u00edcius","family":"de Sousa Lemos","sequence":"first","affiliation":[]},{"given":"L\u00edliam Barroso","family":"Leal","sequence":"additional","affiliation":[]},{"given":"Raimir Holanda","family":"Filho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"H. Alzaid, E. Foo and J. G. Nieto, \u201cSecure Data Aggregation in Wireless Sensor Network: a survey, \u201c In 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.","DOI":"10.1109\/PDCAT.2008.52"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"B. Parno, E. Gaustad, M. Luk and A. Perrig, \u201cSecure Sensor Network Routing: A Clean-Slate Approach,\u201d CoNEXT 2006, Lisboa, Portugal.","DOI":"10.1145\/1368436.1368452"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"A. P. R. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz and H. C. Wong, \u201cDecentralized Intrusion Detection in Wireless Sensor Networks,\u201c In Q2Swinet\u201905. Montreal, Quebec, Canada, 2005.","DOI":"10.1145\/1089761.1089765"},{"key":"41_CR4","volume-title":"Mobile, Wireless and Sensor Networks: technology, applications, and future directions","author":"R. Shorey","year":"2006","unstructured":"R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless and Sensor Networks: technology, applications, and future directions. John Wiley & Sons. Hoboken, New Jersey. 2006"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, \u201cUsing specification-based intrusion detection for automated response,\u201d In Proceeding of 6 th International Symposium, Pittsburgh, PA, September 2003. RAID 2003, Recent Advances in Intrusion Detection.","DOI":"10.1007\/978-3-540-45248-5_8"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"S. Marti, T. Giuli, K. Lai, and M. Baker, \u201cMitigating Routing Misbehavior in Mobile Ad Hoc Networks,\u201d In 6th ACM\/IEEE Internacional Conference on Mobile Computing and Networking MobiCom\u2019 00, Agosto 2000.","DOI":"10.1145\/345910.345955"},{"key":"41_CR7","unstructured":"R. Roman, J. Zhou and J. Lopez, \u201cApplying Intrusion Detection Systems to Wireless Sensor Networks,\u201d in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE"},{"key":"41_CR8","unstructured":"W. R. Pires Jr., T. H. P. Figueiredo, H. C. Wong and A. A. F. Loureiro. \u201cMalicious node detection in wireless sensor networks,\u201d In Proceedings of the 8th International Parallel & Distributed Processing Symposium (IPDPS\u201904), Santa Fe, NM, USA. ISBN 0-7695-2132-0."},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Guorui Li, Jingsha He, Yingfang Fu, \u201cA Distributed Intrusion Detection Scheme for Wireless Sensor Networks,\u201d Distributed Computing Systems Workshops, International Conference on, vol. 0, no.0, pp. 309\u2013314, 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.","DOI":"10.1109\/ICDCS.Workshops.2008.19"},{"key":"41_CR10","unstructured":"C. V. Z. Zhou, S. Karunasekera and C. Leckie, \u201cA peer-to-peer Collaborative Intrusion Detection System\u201d, Networks, 2005. Jointly held with the 2005, IEEE 7th Malaysia International Conference on Communication."},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, \u201cSPINS: Security Protocols for Sensor Networks,\u201d In Mobile Computing and Networking 2001, Rome, Italy.","DOI":"10.1145\/381677.381696"},{"key":"41_CR12","volume-title":"Protocols and Architectures for Wireless Sensor Networks","author":"K. Holger","year":"2008","unstructured":"K. Holger and W. Andreas, Protocols and Architectures for Wireless Sensor Networks. Jonh Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex. England. 2008."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, \u201cChord: A scalable peer-to-peer lookup service for internet applications\u201d, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. San Diego, California, United States. pp. 149 \u2013 160. 2001.","DOI":"10.1145\/383059.383071"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, \u201cConsistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,\u201d Proc. 29th Annu. ACM Symp.,May 1997, pp. 654\u2013663.","DOI":"10.1145\/258533.258660"},{"key":"41_CR15","unstructured":"Sinalgo. http:\/\/dcg.ethz.ch\/projects\/sinalgo\/"},{"key":"41_CR16","unstructured":"NS2. http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:11:34Z","timestamp":1739761894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_41","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}