{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:01:42Z","timestamp":1649203302600},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T00:00:00Z","timestamp":1290729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0508-x","type":"journal-article","created":{"date-parts":[[2010,11,25]],"date-time":"2010-11-25T08:15:47Z","timestamp":1290672947000},"page":"717-743","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic camouflage event based malicious node detection architecture"],"prefix":"10.1007","volume":"64","author":[{"given":"Kanthakumar","family":"Pongaliur","sequence":"first","affiliation":[]},{"given":"Li","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Alex X.","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,26]]},"reference":[{"issue":"7","key":"508_CR1","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422\u2013426","journal-title":"Commun ACM"},{"key":"508_CR2","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/MUE.2007.181","volume-title":"MUE \u201907: proceedings of the 2007 international conference on multimedia and ubiquitous engineering","author":"H Chen","year":"2007","unstructured":"Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: MUE \u201907: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, pp 603\u2013607"},{"key":"508_CR3","volume-title":"Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks","author":"S Ganeriwal","year":"2004","unstructured":"Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, NY, USA"},{"key":"508_CR4","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1145\/1031495.1031515","volume-title":"SenSys \u201904: proceedings of the 2nd international conference on embedded networked sensor systems","author":"C Karlof","year":"2004","unstructured":"Karlof C, Sastry N, Wagner D (2004) Tinysec a link layer security architecture for wireless sensor networks. In: SenSys \u201904: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162\u2013175"},{"key":"508_CR5","volume-title":"Intrusion detection of sinkhole attacks in wireless sensor networks, algorithmic aspects of wireless sensor networks","author":"I Krontiris","year":"2008","unstructured":"Krontiris I, Dimitriou T, Giannetsos T, Mpasoukos M (2008) Intrusion detection of sinkhole attacks in wireless sensor networks, algorithmic aspects of wireless sensor networks. Springer, Berlin"},{"issue":"11\u201312","key":"508_CR6","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1016\/j.comcom.2007.04.025","volume":"30","author":"ECH Ngai","year":"2007","unstructured":"Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput Commun 30(11\u201312):2353\u20132364","journal-title":"Comput Commun"},{"issue":"9\u201310","key":"508_CR7","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s12243-008-0042-5","volume":"63","author":"ASK Pathan","year":"2008","unstructured":"Pathan ASK, Hong CS (2008) Serp: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann T\u00e9l\u00e9commun 63(9\u201310):529\u2013541","journal-title":"Ann T\u00e9l\u00e9commun"},{"issue":"5","key":"508_CR8","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521\u2013534","journal-title":"Wirel Netw"},{"key":"508_CR9","volume-title":"International workshop on wireless ad-hoc networks","author":"A Pirzada","year":"2005","unstructured":"Pirzada A, Mcdonald C (2005) Circumventing sinkholes and wormholes in ad-hoc wireless networks. In: International workshop on wireless ad-hoc networks, London"},{"key":"508_CR10","volume-title":"Proceedings of the 2nd IEEE international symposium on trust security and privacy for pervasive apageslications (TSP 2009)","author":"K Pongaliur","year":"2009","unstructured":"Pongaliur K, Xiao L, Liu A (2009) CENDA: Camouflage event based malicious node detection architecture. In: Proceedings of the 2nd IEEE international symposium on trust security and privacy for pervasive apageslications (TSP 2009), Macau, China"},{"key":"508_CR11","volume-title":"Proceedings of the 1st international conference on autonomic computing and communication systems","author":"R Roman","year":"2007","unstructured":"Roman R, Fernandez-Gago MC, Lopez J (2007) Featuring trust and reputation management systems for constrained hardware devices. In: Proceedings of the 1st international conference on autonomic computing and communication systems, Brussels, Belgium"},{"key":"508_CR12","volume-title":"Proceedings of the first IEEE international conference on system integration and reliability improvements","author":"T Roosta","year":"2006","unstructured":"Roosta T, Shieh S, Sastry S (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: Proceedings of the first IEEE international conference on system integration and reliability improvements, Hanoi"},{"key":"508_CR13","first-page":"1927","volume-title":"Wireless communications and networking conference","author":"CC Su","year":"2005","unstructured":"Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection apagesroaches for clustering-based sensor networks. In: Wireless communications and networking conference, vol\u00a04. IEEE Press, New York, pp 1927\u20131932"},{"key":"508_CR14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/1029102.1029113","volume-title":"SASN \u201904: proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks","author":"R Watro","year":"2004","unstructured":"Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: SASN \u201904: proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp 59\u201364"},{"issue":"11","key":"508_CR15","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1016\/j.jpdc.2007.04.014","volume":"67","author":"B Xiao","year":"2007","unstructured":"Xiao B, Yu B, Gao C (2007) Chemas: Identify suspect nodes in selective forwarding attacks. J Parallel Distrib Comput 67(11):1218\u20131230","journal-title":"J Parallel Distrib Comput"},{"key":"508_CR16","doi-asserted-by":"crossref","DOI":"10.1201\/9781420013399","volume-title":"Security in sensor networks","author":"Y Xiao","year":"2006","unstructured":"Xiao Y (2006) Security in sensor networks. Auerbach Publications, Boca Raton"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0508-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0508-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0508-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:24:02Z","timestamp":1559370242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0508-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,26]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["508"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0508-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,26]]}}}