{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:10:50Z","timestamp":1730214650590,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dest.2012.6227950","type":"proceedings-article","created":{"date-parts":[[2012,7,10]],"date-time":"2012-07-10T21:37:25Z","timestamp":1341956245000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Coupled multi-agent simulations for mobile security &amp; privacy research"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Henne","sequence":"first","affiliation":[{"name":"Distributed Computing &amp; Security Group, Leibniz Universit&#x00E4;t Hannover, Hannover, Germany"}]},{"given":"Christian","family":"Szongott","sequence":"additional","affiliation":[{"name":"Distributed Computing &amp; Security Group, Leibniz Universit&#x00E4;t Hannover, Hannover, Germany"}]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"Distributed Computing &amp; Security Group, Leibniz Universit&#x00E4;t Hannover, Hannover, Germany"}]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/11556114_28"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.04.008"},{"key":"14","first-page":"151","article-title":"Mags project: Multi-agent geosimulation and crowd simulation","volume":"2825","author":"moulin","year":"2003","journal-title":"COSIT Ser LNCS"},{"key":"11","first-page":"221","article-title":"Proximity breeds danger: Emerging threats in metro-area wireless networks","author":"akritidis","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium Ser SS'07"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108111"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2012.6227909"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179545"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQW.2006.361721"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2005.39"},{"journal-title":"SimPy - Simulation in Python","year":"2012","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2011.6079294"},{"key":"9","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1126\/science.1167053","article-title":"Understanding the spreading patterns of mobile phone viruses","volume":"324","author":"wang","year":"2009","journal-title":"Science (New York N Y )"},{"key":"8","article-title":"On the impact of user movement simulations in the evaluation of lbs privacy-preserving techniques","author":"mascetti","year":"2008","journal-title":"Proceedings of the 1st International Workshop on Privacy in Location-Based Applications"}],"event":{"name":"2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering","start":{"date-parts":[[2012,6,18]]},"location":"Campione d'Italia, Italy","end":{"date-parts":[[2012,6,20]]}},"container-title":["2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6222390\/6227884\/06227950.pdf?arnumber=6227950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T18:21:24Z","timestamp":1678472484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6227950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dest.2012.6227950","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}