{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T05:51:00Z","timestamp":1745560260141},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T00:00:00Z","timestamp":1546387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11036-018-1201-1","type":"journal-article","created":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T17:57:18Z","timestamp":1546451838000},"page":"259-270","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network"],"prefix":"10.1007","volume":"24","author":[{"given":"S.","family":"Nithya","sequence":"first","affiliation":[]},{"given":"C.","family":"Gomathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"1201_CR1","doi-asserted-by":"crossref","unstructured":"Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089\u20137798\/12$31.00_c2011 IEEE","DOI":"10.1109\/LCOMM.2012.030512.112304"},{"key":"1201_CR2","doi-asserted-by":"publisher","unstructured":"Raza Bukhari SH, Rehmani MH, Siraj S (2016) A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks. Communications Surveys & Tutorials, \n                    https:\/\/doi.org\/10.1109\/COMST.2015.2504408\n                    \n                  , IEEE","DOI":"10.1109\/COMST.2015.2504408"},{"key":"1201_CR3","unstructured":"Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China Communications"},{"key":"1201_CR4","doi-asserted-by":"crossref","unstructured":"Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018\u20139219\/$25.00 _2007 IEEE","DOI":"10.1109\/JPROC.2007.909930"},{"key":"1201_CR5","doi-asserted-by":"publisher","unstructured":"Huang H, Gong T, Zhang R, Yang L, Zhang J, Xiao F (2018) Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders. IEEE Trans Veh Technol. \n                    https:\/\/doi.org\/10.1109\/TVT.2018.2872848","DOI":"10.1109\/TVT.2018.2872848"},{"key":"1201_CR6","doi-asserted-by":"publisher","unstructured":"Zhao P, Yang X (2016) Opportunistic routing for bandwidth-sensitiven traffic in wireless networks with lossy links. Journal of Communications and Networks 18(5), Digital object identifier. \n                    https:\/\/doi.org\/10.1109\/JCN.2016.000109\n                    \n                  , 1229-2370\/16\/$10.00 c 2016","DOI":"10.1109\/JCN.2016.000109"},{"key":"1201_CR7","doi-asserted-by":"publisher","unstructured":"Mashima D, Gunathilaka P, Chen B (2018) Artificial command delaying for secure substation network control: design and implementation. IEEE Transactions on Smart Grid. \n                    https:\/\/doi.org\/10.1109\/TSG.2017.2744802","DOI":"10.1109\/TSG.2017.2744802"},{"key":"1201_CR8","doi-asserted-by":"crossref","unstructured":"Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018","DOI":"10.1109\/ACCESS.2017.2772294"},{"key":"1201_CR9","doi-asserted-by":"crossref","unstructured":"Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks","DOI":"10.1109\/TSIPN.2017.2749959"},{"key":"1201_CR10","doi-asserted-by":"crossref","unstructured":"Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017","DOI":"10.1109\/ACCESS.2017.2752199"},{"key":"1201_CR11","doi-asserted-by":"publisher","unstructured":"Pan Y, Hou Y, Li M, Gerdes RM, Zeng K, Towfiq MA, Cetiner BA (2017) Message integrity protection over wireless channel: countering signal cancellation via channel randomization. IEEE Transactions on Dependable and Secure Computing. \n                    https:\/\/doi.org\/10.1109\/TDSC.2017.2751600","DOI":"10.1109\/TDSC.2017.2751600"},{"key":"1201_CR12","doi-asserted-by":"crossref","unstructured":"Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045\u20139219\/09\/$25.00 _ 2009 IEEE","DOI":"10.1109\/TPDS.2008.220"},{"key":"1201_CR13","doi-asserted-by":"crossref","unstructured":"Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska\u2013Lincoln, Omaha, 2169\u20133536, IEEE","DOI":"10.1109\/ACCESS.2017.2779146"},{"key":"1201_CR14","doi-asserted-by":"publisher","unstructured":"Tian F, Chen X, Liu S, Yuan X, Li D, Zhang X, Yang Z (2018) Secrecy rate optimization in wireless multi-hop full duplex networks. Special Section on Secure Modulations for Future Wireless Communications and Mobile Networks, Digital Object Identifier. \n                    https:\/\/doi.org\/10.1109\/Access.2018.2794739","DOI":"10.1109\/Access.2018.2794739"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1201-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1201-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1201-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:21:24Z","timestamp":1577924484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1201-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,2]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["1201"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1201-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,2]]},"assertion":[{"value":"2 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}