{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:54:42Z","timestamp":1770821682299,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s12083-019-00781-9","type":"journal-article","created":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T13:03:50Z","timestamp":1568034230000},"page":"752-761","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network"],"prefix":"10.1007","volume":"13","author":[{"given":"C.","family":"Umarani","sequence":"first","affiliation":[]},{"given":"S.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"781_CR1","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/SURV.2012.121912.00006","volume":"15","author":"A Abduvaliyev","year":"2013","unstructured":"Abduvaliyev A, Pathan A-SK, Zhou J, Roman R, Wong W-C (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials 15:1223\u20131237","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"781_CR2","unstructured":"Dhangar K, Kulhare D, Khan A (2013) Analysis of proposed intrusion detection system. Int J Comput Appl 65"},{"key":"781_CR3","unstructured":"Soliman OS, Rassem A (2014) A network intrusions detection system based on a quantum bio inspired algorithm. arXiv preprint arXiv:1405.1404"},{"key":"781_CR4","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11276-015-1015-z","volume":"22","author":"N Assad","year":"2016","unstructured":"Assad N, Elbhiri B, Faqihi MA, Ouadou M, Aboutajdine D (2016) Efficient deployment quality analysis for intrusion detection in wireless sensor networks. Wirel Netw 22:991\u20131006","journal-title":"Wirel Netw"},{"key":"781_CR5","doi-asserted-by":"crossref","unstructured":"Rajeshkumar G, Valluvan K (2017) An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wirel Pers Commun: 94: 1993\u20132007","DOI":"10.1007\/s11277-016-3349-y"},{"key":"781_CR6","doi-asserted-by":"crossref","unstructured":"Puri A, Sharma N (2017) A survey on intrusion detection system,System,\" International Journal of Engineering Development and Research (IJEDR), 5:123\u2013126, 2017.","DOI":"10.17148\/IJARCCE.2017.6424"},{"key":"781_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/167575","volume":"9","author":"NA Alrajeh","year":"2013","unstructured":"Alrajeh NA, Khan S, Shams B (2013) Intrusion detection systems in wireless sensor networks: a review. International Journal of Distributed Sensor Networks 9:167575","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"781_CR8","doi-asserted-by":"crossref","unstructured":"Eswari T, Vanitha V (2013) A novel rule based intrusion detection framework for wireless sensor networks. In: 2013 international conference on information communication and embedded systems (ICICES), 2013, pp 1019\u20131022","DOI":"10.1109\/ICICES.2013.6508172"},{"key":"781_CR9","doi-asserted-by":"crossref","unstructured":"Pantazis NA, Nikolidakis SA, Vergados DD (2012) Energy-efficient routing protocols in wireless sensor networks: a survey. IEEE Communications surveys & tutorials 15:551\u2013591","DOI":"10.1109\/SURV.2012.062612.00084"},{"key":"781_CR10","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials 16:266\u2013282","journal-title":"IEEE communications surveys & tutorials"},{"key":"781_CR11","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1093\/comjnl\/bxu036","volume":"58","author":"G Han","year":"2014","unstructured":"Han G, Li X, Jiang J, Shu L, Lloret J (2014) Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. Comput J 58:1280\u20131292","journal-title":"Comput J"},{"key":"781_CR12","doi-asserted-by":"crossref","unstructured":"Khan F (2014) Secure communication and routing architecture in wireless sensor networks. In: Consumer electronics (GCCE), 2014 IEEE 3rd global conference on, pp 647\u2013650","DOI":"10.1109\/GCCE.2014.7031298"},{"key":"781_CR13","doi-asserted-by":"crossref","unstructured":"Kumar ES, Kusuma S, Kumar BV (2014) A random key distribution based artificial immune system for security in clustered wireless sensor networks. In: 2014 IEEE students\u2019 conference on electrical, electronics and computer science (SCEECS), pp 1\u20137","DOI":"10.1109\/SCEECS.2014.6804506"},{"key":"781_CR14","unstructured":"Bartariya S, Rastogi A (2016) Security in wireless sensor networks: attacks and solutions. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), vol 5"},{"key":"781_CR15","doi-asserted-by":"crossref","unstructured":"Xiao X, Zhang R (2017) Study of immune-based intrusion detection technology in wireless sensor networks. Arab J Sci Eng:1\u201316","DOI":"10.1007\/s13369-017-2426-1"},{"key":"781_CR16","unstructured":"Hamad IEH, Abid M (2017) BTRMC, a bio-inspired trust and reputation model using clustering in WSNs. In: 2017 international conference on smart, monitored and controlled cities (SM2C), pp 5\u201311"},{"key":"781_CR17","unstructured":"Zhang W, Zhu S, Tang J, Xiong N (2017) A novel trust management scheme based on Dempster\u2013Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput:1\u201323"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00781-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00781-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00781-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T23:17:45Z","timestamp":1599520665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00781-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["781"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00781-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"29 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}