{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:36:17Z","timestamp":1764783377798,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134398","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["Averting In-Situ Adversaries in Wireless Sensor Network Using Deceptive Traffic"],"prefix":"10.1109","author":[{"given":"Yousef","family":"Ebrahimi","sequence":"first","affiliation":[]},{"given":"M.","family":"Younis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.03.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2000.860211"},{"key":"ref12","article-title":"Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks","author":"conner","year":"0","journal-title":"DCOSS '06 Springer-Verlag LNCS 4026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322037"},{"key":"ref8","article-title":"Towards Measuring Anonymity","author":"d'iaz","year":"0","journal-title":"PET 2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/JPROC.2003.814918","article-title":"Sensor networks: Evolution, opportunities, and challenges","volume":"91","author":"chong","year":"0","journal-title":"Proc of the IEEE"},{"key":"ref9","article-title":"Towards an Information Theoretic Metric for Anonymity","author":"serjantov","year":"0","journal-title":"PET 2002"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134398.pdf?arnumber=6134398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:31:51Z","timestamp":1497951111000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134398","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}