{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:19:13Z","timestamp":1761322753538,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416949","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:03Z","timestamp":1199462343000},"page":"1408-1411","source":"Crossref","is-referenced-by-count":11,"title":["A decentralized intrusion detection system for increasing security of wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Ioannis","family":"Chatzigiannakis","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Strikos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Wormhole detection in wireless ad hoc networks","author":"hu","year":"2002","journal-title":"Tech Rep TR01-384"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639412"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref12","article-title":"A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks","author":"wood","year":"2004","journal-title":"Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref2","first-page":"579","article-title":"Experimental Evaluation of the Performance of Multi-hop Wireless Sensor Networks","author":"chatzigiannakis","year":"2006","journal-title":"Proc 5th IEEE Symposium on Communication Systems Networks and Digital Signal Processing (CSNDSP'06)"},{"key":"ref9","first-page":"681","article-title":"On the Security of Wireless Sensor Networks","volume":"3482","author":"roman","year":"2005","journal-title":"Proceedings of 2005 ICCSA Workshop on Internet Communications Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.52"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416949.pdf?arnumber=4416949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T17:34:52Z","timestamp":1489685692000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416949","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}