{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:36:20Z","timestamp":1730208980128,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cns.2016.7860527","type":"proceedings-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T19:32:43Z","timestamp":1487878363000},"page":"401-405","source":"Crossref","is-referenced-by-count":3,"title":["Inducing data loss in Zigbee networks via join\/association handshake spoofing"],"prefix":"10.1109","author":[{"given":"Spencer","family":"Michaels","sequence":"first","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]},{"given":"A.","family":"Selcuk Uluagac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033894"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784993"},{"key":"ref13","first-page":"219","author":"stelte","year":"2013","journal-title":"Thwarting attacks on zigbee - removal of the killerbee stinger"},{"key":"ref4","article-title":"Zigbee exploited - the good, the bad and the ugly","author":"zillner","year":"2015","journal-title":"Black Hat"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2012.6506569"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2012.6416593"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2016.7494140"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502322"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2010.79"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.75"},{"key":"ref9","first-page":"1005","article-title":"An approach to mitigating sybil attack in wireless networksusing zigbee","volume":"2","author":"lee","year":"2008","journal-title":"Advanced Communication Technology 2008 ICACT 2008 10th International Conference on"}],"event":{"name":"2016 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2016,10,17]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7854080\/7860451\/07860527.pdf?arnumber=7860527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T08:12:56Z","timestamp":1489047176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7860527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cns.2016.7860527","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}