{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:47:53Z","timestamp":1769842073317,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/est.2017.8090414","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T22:42:25Z","timestamp":1509662545000},"page":"144-149","source":"Crossref","is-referenced-by-count":16,"title":["Distributed intrusion detection using mobile agents in wireless body area networks"],"prefix":"10.1109","author":[{"given":"Adedayo","family":"Odesile","sequence":"first","affiliation":[]},{"given":"Geethapriya","family":"Thamilarasu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Lightweight energy consumption based intrusion detection system for wireless sensor networks","author":"riecker michael","year":"2013","journal-title":"Proceedings of the 28th Annual ACM Symposium on Applied Computing ACM"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2003.1259833"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/KMN.2002.1115178"},{"key":"ref13","article-title":"Mobile agent based hierarchical intrusion detection system in wireless sensor networks","volume":"9","author":"khanum","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158178"},{"key":"ref15","year":"0","journal-title":"Castalia home"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2016.075074"},{"key":"ref5","article-title":"Intrusion detection and prevention of node replication attacks in wireless body area sensor networks","volume":"3","author":"anandumar","year":"2012","journal-title":"International Journal of UbiComp(IJU)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD-SAWN.2005.31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.121313.00064"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2009","DOI":"10.1109\/ICMLC.2003.1259833","article-title":"A safe mobile agent system for distributed intrusion detection","volume":"4","author":"zhong","year":"2003","journal-title":"Machine Learning and Cybernetics 2003 International Conference on"}],"event":{"name":"2017 Seventh International Conference on Emerging Security Technologies (EST)","location":"Canterbury, United Kingdom","start":{"date-parts":[[2017,9,6]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 Seventh International Conference on Emerging Security Technologies (EST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8078162\/8090385\/08090414.pdf?arnumber=8090414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T10:21:45Z","timestamp":1570270905000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8090414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/est.2017.8090414","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}