{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:13:13Z","timestamp":1725487993763},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cit.2004.1357257","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:02Z","timestamp":1103776442000},"page":"581-586","source":"Crossref","is-referenced-by-count":3,"title":["The implementation of a proactive wireless intrusion detection system"],"prefix":"10.1109","author":[{"family":"Wen-Chuan Hsieh","sequence":"first","affiliation":[]},{"family":"Chi-Chun Lo","sequence":"additional","affiliation":[]},{"family":"Jing-Chi Lee","sequence":"additional","affiliation":[]},{"family":"Li-Tsung Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Real 802 11 Security","year":"2003","author":"edney","key":"19"},{"journal-title":"802 11 Security","year":"2003","author":"potter","key":"17"},{"journal-title":"Building Community Network","year":"2003","author":"flickenger","key":"18"},{"journal-title":"Introduction to Wireless Auditing","year":"2002","author":"whalen","key":"15"},{"journal-title":"A Technical Tutorial on the IEEE 802 11 Protocol","year":"1997","author":"brenner","key":"16"},{"journal-title":"802 11 wireless networks - The definitive guide","year":"2002","author":"gast","key":"13"},{"journal-title":"Hack Proofing Your Wireless Networks","year":"2002","author":"christian","key":"14"},{"journal-title":"Building Wireless Network","year":"2002","key":"11"},{"journal-title":"Wireless LAN Security 802 11b and Corporate Networks","year":"0","key":"12"},{"journal-title":"Rule-based Intrusion Detection [Online]","year":"1997","author":"gerken","key":"3"},{"journal-title":"Featured on the NPR War-drive!","year":"0","author":"beetle","key":"2"},{"journal-title":"Weaknesses in the Key Scheduling Algorithm of RC-4 [Postscript]","year":"2001","author":"fluhrer","key":"1"},{"journal-title":"Honeypots - Definitions and Value of Honeypots","year":"2003","author":"spitzner","key":"10"},{"journal-title":"A Guide to War Driving and Detecting Wardrivers","year":"0","author":"etter","key":"7"},{"journal-title":"The Definitive Guide to Wireless Warx'in","year":"0","author":"slayer","key":"6"},{"journal-title":"The Evolution of War Flying","year":"0","author":"williams","key":"5"},{"journal-title":"Statistical-based Intrusion Detection [Online]","year":"2003","author":"farshchi","key":"4"},{"journal-title":"WEP Encryption Procedure","year":"0","key":"9"},{"journal-title":"Everything you Need to Know About Intrusion Detection","year":"0","key":"8"}],"event":{"name":"The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.","location":"Wuhan, China"},"container-title":["The Fourth International Conference onComputer and Information Technology, 2004. CIT '04."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9381\/29791\/01357257.pdf?arnumber=1357257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T01:13:05Z","timestamp":1489453985000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1357257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cit.2004.1357257","relation":{},"subject":[]}}