{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:29:04Z","timestamp":1763663344907},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/eurfid.2015.7332388","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:48:14Z","timestamp":1448300894000},"page":"73-80","source":"Crossref","is-referenced-by-count":10,"title":["An effective intrusion detection approach for jamming attacks on RFID systems"],"prefix":"10.1109","author":[{"given":"Leandro","family":"Avanco","sequence":"first","affiliation":[]},{"given":"A. E.","family":"Guelfi","sequence":"additional","affiliation":[]},{"given":"Elvis","family":"Pontes","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"A. Silva","sequence":"additional","affiliation":[]},{"given":"S. T.","family":"Kofuji","sequence":"additional","affiliation":[]},{"given":"F.","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"RFID jamming and attacks on Israeli e-voting","author":"oren","year":"2012","journal-title":"SmartSysTech"},{"year":"2008","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753218"},{"article-title":"A hybrid fuzzy\/genetic algorith for intrusion detection in RFID systems","year":"2011","author":"geta","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0118-3"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665121"},{"year":"2011","key":"ref6","article-title":"SINIAV"},{"key":"ref5","first-page":"1","article-title":"The survey of RFID attacks and defenses","author":"hong","year":"2012","journal-title":"WiCOM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2010.5551848"},{"journal-title":"SLT S&#x00E3;o Paulo","article-title":"Resolucao SLT 13\/2011 - Operacao do Sistema Automatico de Ar-recadacao de Pedagio nas Rodovias Concedidas ou Administradas pelo Estado de S&#x00E3;o Paulo","year":"2011","key":"ref7"},{"key":"ref2","first-page":"6","article-title":"Technique for preventing DoS attacks on RFID systems","author":"tagra","year":"2010","journal-title":"SoftCOM"},{"journal-title":"RFID Essentials","year":"2006","author":"glover","key":"ref1"},{"year":"2013","key":"ref9"},{"year":"0","key":"ref20"},{"year":"0","key":"ref21"}],"event":{"name":"2015 International EURASIP Workshop on RFID Technology (EURFID)","start":{"date-parts":[[2015,10,22]]},"location":"Rosenheim, Germany","end":{"date-parts":[[2015,10,23]]}},"container-title":["2015 International EURASIP Workshop on RFID Technology (EURFID)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328574\/7332373\/07332388.pdf?arnumber=7332388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T19:53:02Z","timestamp":1490385182000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/eurfid.2015.7332388","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}