{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:53:11Z","timestamp":1729615991106,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/broadnets.2007.4550467","type":"proceedings-article","created":{"date-parts":[[2008,6,24]],"date-time":"2008-06-24T18:27:28Z","timestamp":1214332048000},"page":"444-448","source":"Crossref","is-referenced-by-count":1,"title":["Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution"],"prefix":"10.1109","author":[{"given":"A.","family":"Das","sequence":"first","affiliation":[]},{"given":"G.","family":"Kesidis","sequence":"additional","affiliation":[]},{"given":"V.","family":"Pothamsetty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39867-7_70","article-title":"Equilibrium analysis of packet forwarding strategies in wireless ad hoc networks - the static case","author":"felegyhazi","year":"2003","journal-title":"Proc Personal Wireless Comm (PWC)"},{"key":"ref3","article-title":"Modelling incentives for collaboration in mobile ad hoc networks","author":"crowcroft","year":"2003","journal-title":"Proc WiOpt"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278598"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.873833"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TMC.2006.1599404","article-title":"Optimal resource allocation in wireless ad hoc networks: A price-based approach","volume":"5","author":"xue","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref5","article-title":"Avoiding malicious packet dropping in ad hoc networks using multipath routing","author":"jeon","year":"2005","journal-title":"Proc 43rd Allerton Conference on Communications Control and Computing"},{"key":"ref12","article-title":"A distributed reputation approach to cooperative Internet routing protection","author":"yu","year":"2005","journal-title":"1st IEEE ICNP Workshop on Secure Network Protocols (NPSec)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778418"},{"key":"ref7","article-title":"A border gateway protocol 4 (BGP-4)","author":"rekhter","year":"1995","journal-title":"IETF RFC 1771"},{"key":"ref2","article-title":"Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks","author":"butty\u00e1n","year":"2001","journal-title":"Technical Report DSC\/2001\/001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2006.1666570"},{"key":"ref1","article-title":"Denial of service resilience in ad hoc networks","author":"aad","year":"2004","journal-title":"Proc ACM MobiCom"}],"event":{"name":"2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007)","start":{"date-parts":[[2007,9,10]]},"location":"Raleigh, NC, USA","end":{"date-parts":[[2007,9,14]]}},"container-title":["2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543893\/4550387\/04550467.pdf?arnumber=4550467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:24:13Z","timestamp":1497777853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/broadnets.2007.4550467","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}