{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:41:58Z","timestamp":1770817318996,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949388","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"186-193","source":"Crossref","is-referenced-by-count":0,"title":["Biodiversity: A security approach for ad hoc networks"],"prefix":"10.1109","author":[{"given":"Jennifer","family":"Jackson","sequence":"first","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]},{"given":"Mark S.","family":"Leeson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Scenarios, volume 2","author":"carpenter","year":"2005","journal-title":"Ecosystem and Human Well-being"},{"key":"ref31","author":"magurran","year":"2003","journal-title":"Measuring Biological Diversity"},{"key":"ref30","article-title":"Attacks against mobile ad hoc networks routing protocols","author":"razak","year":"2004","journal-title":"The 6th Annual PostGraduate Symposium on The Convergence of Telecommunications Networking and Broadcasting"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925090"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/1161089.1161093","article-title":"A coordinate-based approach for exploiting temporal-spatial diversity in wireless mesh networks","author":"lim","year":"2006","journal-title":"Mobicom"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1095714.1095759"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2006.259000"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374640"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029157"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/49.285295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/384192.384195"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347167"},{"key":"ref28","first-page":"184","article-title":"A reliable and secure framework for detection and isolation of malicious nodes in manet","volume":"8","author":"dhanalakshmi","year":"2008","journal-title":"Computer Science and Network Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/et.2010.0504"},{"key":"ref27","first-page":"118","article-title":"Prevention of impersonation attack in wireless mobile ad hoc networks","volume":"7","author":"tamilselvan","year":"2007","journal-title":"Computer Science and Network Security"},{"key":"ref3","article-title":"Three criteria for malware existence","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1046\/j.1523-1739.2000.99014.x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00013-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/367363a0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3201\/eid1507.081083"},{"key":"ref2","article-title":"Kaspersky security bulletin 2009","author":"aseev","year":"2009","journal-title":"Malware evolution"},{"key":"ref1","year":"2010","journal-title":"Symantec Global Internet Security Threat Report Trends for 2009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.07.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1992.217601"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250686"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.02.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595692"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref26","author":"pickett","year":"1985","journal-title":"Natural disturbance and patch dynamics"},{"key":"ref25","article-title":"Diversity as a computer defense mechanism a panel","author":"taylor","year":"2006","journal-title":"NSPW"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","location":"Paris, France","start":{"date-parts":[[2011,4,11]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949388.pdf?arnumber=5949388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T23:25:23Z","timestamp":1686180323000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949388","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}