{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T22:10:14Z","timestamp":1713564614373},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,2,17]],"date-time":"2012-02-17T00:00:00Z","timestamp":1329436800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s11277-012-0541-6","type":"journal-article","created":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T21:19:51Z","timestamp":1329427191000},"page":"1595-1609","source":"Crossref","is-referenced-by-count":3,"title":["Secure Access Control Guarding Against Internal Attacks in Distributed Networks"],"prefix":"10.1007","volume":"68","author":[{"given":"Jiwen","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xianwei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Junling","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Haitao","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,17]]},"reference":[{"issue":"2\u20133","key":"541_CR1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3166\/ejc.13.105-133","volume":"13","author":"J. S. Baras","year":"2007","unstructured":"Baras J. S. (2007) Security and trust for wireless autonomic networks systems and control methods. European Journal of Control 13(2\u20133): 105\u2013133","journal-title":"European Journal of Control"},{"issue":"1","key":"541_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2007-15102","volume":"15","author":"C. Zouridaki","year":"2007","unstructured":"Zouridaki C., Mark B. L., Hejmo M., Thomas R. K. (2007) Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security 15(1): 3\u201338","journal-title":"Journal of Computer Security"},{"issue":"9","key":"541_CR3","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1016\/j.comcom.2010.02.007","volume":"33","author":"K. Drira","year":"2010","unstructured":"Drira K., Seba H., Kheddouci H. (2010) ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications 33(9): 1094\u20131107","journal-title":"Computer Communications"},{"issue":"2","key":"541_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.adhoc.2009.07.001","volume":"8","author":"E. Ayday","year":"2010","unstructured":"Ayday E., Fekri F. (2010) A protocol for data availability in mobile ad-hoc networks in the presence of in sider attack. Ad Hoc Networks 8(2): 181\u2013192","journal-title":"Ad Hoc Networks"},{"key":"541_CR5","doi-asserted-by":"crossref","unstructured":"Mohi, M., Movaghar, A., & Zadeh, P. M. (2009, January). A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In International conference on communications and mobile computing (CMC). Kunming, Yunnan, China.","DOI":"10.1109\/CMC.2009.325"},{"key":"541_CR6","unstructured":"Tian, L., & Lin, C. (2010). Computation and analysis of node intending trust in WSNs. In 2010 IEEE international conference on wireless communications. Beijing: Networking and Information Security (WCNIS). June 2010."},{"key":"541_CR7","unstructured":"Lin, Y., & Li, M. (2009). Distributed detection of jamming and defense in wireless sensor networks. In 43rd annual conference on information sciences and systems (CISS). USA: Baltimore, March 2009."},{"issue":"4","key":"541_CR8","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1002\/wcm.777","volume":"10","author":"K. C. Chen","year":"2010","unstructured":"Chen K. C., Chen P. Y., Prasad N., Liang Y. C., Sun S. (2010) Trusted cognitive radio networking. Wireless Communications and Mobile Computing 10(4): 467\u2013485","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"5","key":"541_CR9","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1016\/j.adhoc.2009.01.001","volume":"7","author":"I. F. Akyildiz","year":"2009","unstructured":"Akyildiz I. F., Lee W. Y., Chowdhury K. R. (2009) CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Networks 7(5): 810\u2013836","journal-title":"Ad Hoc Networks"},{"key":"541_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511619755","volume-title":"Security and quality of service in ad hoc wireless networks","author":"A. Mishra","year":"2008","unstructured":"Mishra A. (2008) Security and quality of service in ad hoc wireless networks. Cambridge University Press, Cambridge"},{"key":"541_CR11","doi-asserted-by":"crossref","DOI":"10.1002\/9780470515143","volume-title":"Cognitive networks: Towards self-aware networks","author":"Q. Mahmoud","year":"2007","unstructured":"Mahmoud Q. (2007) Cognitive networks: Towards self-aware networks. Wiley, New York, NY"},{"key":"541_CR12","doi-asserted-by":"crossref","unstructured":"Beghriche, Y., Toubiana, V., & Labiod, H. (2008). A Bayesian filter to detect misbehaving nodes in MANETs. In New technologies, mobility and security conference and Workshops (NTMS). Tangier, Morocco, November 2008.","DOI":"10.1109\/NTMS.2008.ECP.7"},{"key":"541_CR13","doi-asserted-by":"crossref","unstructured":"Begriche, Y., & Labiod, H. (2009). A Bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol. In 7th international conference on information, communications and signal processing (ICICS). Macau Fisherman\u2019s Wharf, China, December 2009.","DOI":"10.1109\/ICICS.2009.5397627"},{"key":"541_CR14","doi-asserted-by":"crossref","unstructured":"Yang, L., Kizza, J. M., Cemerlic, A., & Liu, F. (2007). Fine-grained reputation-based routing in wireless ad hoc networks. In IEEE intelligence and security informatics. New Brunswick, NJ, May 2007.","DOI":"10.1007\/978-3-540-71549-8"},{"key":"541_CR15","doi-asserted-by":"crossref","unstructured":"Burmester, M., & Van Le, T. (2004). Secure communications in ad hoc networks. In 5th annual IEEE system, man and cybernetics information assurance workshop (SMC). West Point, NY, June 2004.","DOI":"10.1109\/IAW.2004.1437822"},{"key":"541_CR16","doi-asserted-by":"crossref","unstructured":"Burmester, M., & Van Le, T. (2004). Secure multipath communication in mobile ad hoc networks. In International conference on information technology: Coding computing (ITCC). Las Vegas, NV, April 2004","DOI":"10.1109\/ITCC.2004.1286675"},{"key":"541_CR17","doi-asserted-by":"crossref","unstructured":"Ayday, E., & Fekri, F. (2008). Using node accountability in credential based routing for mobile ad-hoc networks. In 5th IEEE international conference on mobile ad-hoc and sensor systems (MASS). Atlanta, GA, September 2008.","DOI":"10.1109\/MAHSS.2008.4660020"},{"key":"541_CR18","doi-asserted-by":"crossref","unstructured":"Hu, N., Zhu, P., & Zou, P. (2009). An alliance based reputation model for internet autonomous system trust evaluation. In IEEE international symposium on parallel and distributed processing with applications (ISPA). Chengdu, Sichuan, China, August 2009.","DOI":"10.1109\/ISPA.2009.104"},{"key":"541_CR19","doi-asserted-by":"crossref","unstructured":"Lee, M., Ye, X., Johnson, S., Marconett, D., Vsk, C., Vemuri, R., & Yoo, S. J. B. (2009). Cognitive security management with reputation based cooperation schemes in heterogeneous networks. In IEEE symposium on computational intelligence in cyber security (CICS). Nashville, TN, March 2009.","DOI":"10.1109\/CICYBS.2009.4925085"},{"issue":"2\u20133","key":"541_CR20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11235-009-9242-1","volume":"45","author":"K. Wrona","year":"2010","unstructured":"Wrona K., Hallingstad G. (2010) Real-time automated risk assessment in protected core networking. Telecommunication Systems 45(2\u20133): 205\u2013214","journal-title":"Telecommunication Systems"},{"key":"541_CR21","unstructured":"Bose, S., Bharathimurugan, S., & Kannan, A. (2007). Multi-layer integrated anomaly intrusion detection system for mobile ad hoc networks. In International conference on signal processing, communications and networking (ICSCN). Chennai, India, Febrary 2007."},{"key":"541_CR22","doi-asserted-by":"crossref","unstructured":"Ding, J., Xu, S., Kramer, B., Bai, Y., Chen, H., & Zhang, J. (2004). Probabilistic inference strategy in distibuted intrusion detection systems. In International symposium on parallel and distributed processing and applications. Hong Kong, China, December 2004.","DOI":"10.1007\/978-3-540-30566-8_97"},{"issue":"6","key":"541_CR23","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1002\/wcm.493","volume":"8","author":"D. Djenouri","year":"2008","unstructured":"Djenouri D., Badache N. (2008) Struggling against selfishness and black hole attacks in MANETs. Wireless Communications Mobile Computing 8(6): 689\u2013704","journal-title":"Wireless Communications Mobile Computing"},{"issue":"2\u20133","key":"541_CR24","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1002\/sec.173","volume":"3","author":"L. Yang","year":"2010","unstructured":"Yang L., Cemerlic A., Cui X. (2010) A Dirichlet reputation system in reliable routing of wireless ad hoc network. Security and Communication Networks 3(2\u20133): 250\u2013260","journal-title":"Security and Communication Networks"},{"key":"541_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4286-2","volume-title":"Statistical decision theory and Bayesian analysis","author":"J. O. Berger","year":"1985","unstructured":"Berger J. O. (1985) Statistical decision theory and Bayesian analysis. Springer, New York, NY"},{"key":"541_CR26","doi-asserted-by":"crossref","unstructured":"Guo, J., Zhou, X., Miao, X., & Zhang, Z. (2011). Secure minimum-energy multicast tree based on trust mechanism for cognitive radio networks. Wireless Personal Communications. doi: 10.1007\/s11277-011-0390-8 .","DOI":"10.1007\/s11277-011-0390-8"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0541-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0541-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0541-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T21:44:39Z","timestamp":1713563079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0541-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,17]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["541"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0541-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,17]]}}}