{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:35:07Z","timestamp":1761708907712,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cicybs.2013.6597198","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T12:24:33Z","timestamp":1379593473000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Indoor geo-fencing and access control for wireless networks"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Rahimi","sequence":"first","affiliation":[]},{"given":"A.","family":"Nur Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Bharat","family":"Gadher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2025876.2025889"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1373859"},{"key":"15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.proeng.2012.04.170","article-title":"Wifi bluetooth based combined positioning algorithm","volume":"35","author":"galvan-tejada","year":"2012","journal-title":"Procedia Engineering"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2011.50"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200692"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2010.5483748"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016003126882"},{"key":"12","article-title":"Location-aware computing: A neural network model for determining location in wireless lans","author":"battiti","year":"2002","journal-title":"Tech Rep"},{"year":"0","key":"21"},{"year":"0","key":"20"},{"year":"0","key":"22"},{"key":"23","article-title":"Byod: Bring your own device","author":"ballagas","year":"2004","journal-title":"Media Computing Group"},{"journal-title":"Http \/\/www Eweek Com\/c\/a\/Mobile-and-Wireless\/ BYOD-Trend-Puts-Pressure-on-Corporate-Networks-186705\/","year":"0","key":"24"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"25"},{"year":"0","key":"26"},{"journal-title":"C4 5 Programs for Machine Learning San Francisco","year":"1993","author":"quinlan","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1142\/6604","volume":"69","author":"rokach","year":"2007","journal-title":"Data Mining with Decision Trees Theroy and Applications Ser Series in Machine Perception and Artificial Intelligence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70013-2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"10","first-page":"18","author":"castro","year":"2001","journal-title":"A Probabilistic Room Location Service for Wireless Networked Environments"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2009.5399328"},{"year":"0","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192736"},{"key":"6","article-title":"Enhancements to the radar user location and tracking system","author":"bahl","year":"2000","journal-title":"Tech Rep"},{"volume":"2004","journal-title":"The Economist","year":"0","key":"5"},{"journal-title":"IEEE Standards C\/LMLAN\/ MAN Standards Committee","year":"2002","key":"4"},{"key":"9","article-title":"Indoor lbs based on svm and rssi method","author":"chang","year":"2011","journal-title":"Proceedings of BAI Conference"},{"key":"8","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1007\/11893004_81","article-title":"Adequate rssi determination method by making use of svm for indoor localization","author":"miura","year":"2006","journal-title":"Proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems-Volume Part II"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore, Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588697\/6597196\/06597198.pdf?arnumber=6597198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T03:27:33Z","timestamp":1563938853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2013.6597198","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}