{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:30:02Z","timestamp":1761895802370,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/comsnets.2014.6734875","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T16:08:18Z","timestamp":1392307698000},"page":"1-8","source":"Crossref","is-referenced-by-count":20,"title":["Novel approach for security in Wireless Sensor Network using bio-inspirations"],"prefix":"10.1109","author":[{"given":"Heena","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Venkataramana","family":"Badarla","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9281-7"},{"key":"17","first-page":"38","article-title":"Discovery of malicious nodes in wireless sensor networks using neural predictors","volume":"2","author":"curiac","year":"2007","journal-title":"WSEAS Transactions on Computer Research"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/9.412624"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2010.1301"},{"key":"16","first-page":"69","article-title":"A survey of intrusion detection schemes in wireless sensor networks","volume":"9","author":"rassam","year":"2012","journal-title":"American Journal of Applied Sciences"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00276864"},{"key":"14","article-title":"Probabilistic modelling and recursive bayesian estimation of trust in wireless sensor networks","author":"momani","year":"2007","journal-title":"Book on Bayesian Network"},{"journal-title":"Artificial Immune Systems","year":"2010","author":"greensmith","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NaBIC.2012.6402234"},{"key":"21","first-page":"2","author":"mitchell","year":"1977","journal-title":"Book on Machine Learning"},{"key":"20","first-page":"836","article-title":"Malicious node detection in wireless sensor networks using weighted trust evaluation","author":"atakli","year":"2008","journal-title":"Proceedings of the Spring Simulation Multiconference"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.408"},{"key":"23","first-page":"284","article-title":"Information theory, inference and learning algorithms","author":"david","year":"2003","journal-title":"Chapter 20 An Example Inference Task Clustering"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.48"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760185243"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3401"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/NaBIC.2013.6617852"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.024"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.022"},{"key":"10","first-page":"24132427","article-title":"Trust-based security for wireless ad hoc and sensor networks","volume":"30","author":"boukerch","year":"2007","journal-title":"Elsevier Computer Communications Journal"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"6","first-page":"19","article-title":"Trust-based approach in wireless sensor networks using an agent to each cluster","volume":"2","author":"reddy","year":"2012","journal-title":"International Journal of Security Privacy and Trust Management"},{"key":"5","first-page":"41","article-title":"A survey of routing attacks and security measures in mobile ad-hoc networks","volume":"3","author":"agrawal","year":"2011","journal-title":"Journal of Computing"},{"journal-title":"Introduction to TCP\/IP Network Attacks","year":"1997","author":"yang","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9281-7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.122"}],"event":{"name":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2014,1,6]]},"location":"Bangalore","end":{"date-parts":[[2014,1,10]]}},"container-title":["2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720258\/6734849\/06734875.pdf?arnumber=6734875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:37:51Z","timestamp":1490297871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6734875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2014.6734875","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}