{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:26:40Z","timestamp":1725614800303},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766543","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"55-59","source":"Crossref","is-referenced-by-count":2,"title":["A joint framework of passive monitoring system for complex wireless networks"],"prefix":"10.1109","author":[{"given":"Boaz","family":"Benmoshe","sequence":"first","affiliation":[]},{"given":"Eyal","family":"Berliner","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Dvir","sequence":"additional","affiliation":[]},{"given":"Aharon","family":"Gorodischer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330140"},{"key":"ref33","first-page":"654","article-title":"From centralized to distributed selective overhearing","author":"gutnik","year":"0","journal-title":"Proceedings of the 21st National Conference on Artificial Intelligence-Volume 2"},{"key":"ref32","article-title":"Monitoring Large-Scale Multi-Agent Systems using Overhearing","author":"gutnik","year":"2006","journal-title":"Ph D thesis"},{"year":"2007","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298147"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20070017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4785389"},{"journal-title":"Wireless Networks Department of Electrical and Computer Engineering and the CAIP Center","year":"0","author":"marsic","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356974"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4750-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.05.003"},{"key":"ref13","first-page":"1","article-title":"Enhancing the security of corporate Wi-Fi networks using DAIR","author":"bahl","year":"0","journal-title":"Proceedings of the 4th International Conference on Mobile Systems Applications and Services"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023660"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159920"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134702"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2009.39"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444112"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.578"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1509968"},{"key":"ref28","first-page":"13","article-title":"An accurate technique for measuring the wireless side of wireless networks","author":"yeo","year":"0","journal-title":"Proceedings of the 2005 workshop on Wireless traffic measurements and modeling"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.196"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2006.1666498"},{"key":"ref6","first-page":"11","article-title":"Understanding link-layer behavior in highly congested IEEE 802.11 b wireless networks","author":"jardosh","year":"0","journal-title":"Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis"},{"article-title":"A survey of QoS techniques in 802.11","year":"2003","author":"drabu","key":"ref5"},{"article-title":"Wi-Foo: The Secrets of Wireless Hacking: Pearson Education","year":"2004","author":"vladimirov","key":"ref29"},{"key":"ref8","first-page":"30","article-title":"Disasters and Communication Technology: Perspectives from Asia","author":"yodmani","year":"2001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2008.4493436"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1325887"},{"article-title":"Telecommunications infrastructure in disasters: preparing cities for crisis communications","year":"2005","author":"townsend","key":"ref9"},{"journal-title":"802 11 Wireless Networks The Definitive Guide","year":"2005","author":"gast","key":"ref1"},{"journal-title":"Project MESA","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44954.13.6.20050101\/86218.5"},{"year":"0","key":"ref21","article-title":"The SAFECOM communications program of the Department of Homeland Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.1999.801993"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2004.1266117"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2009.47"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766543.pdf?arnumber=5766543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:35:13Z","timestamp":1490081713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766543","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}