{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:48:43Z","timestamp":1725536923304},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/ic3.2016.7880235","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T16:33:57Z","timestamp":1490027637000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Unmasking non-simultaneous sybils in mobile opportunistic networks"],"prefix":"10.1109","author":[{"given":"Parmeet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Sangeeta","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2010.1"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"651","DOI":"10.21307\/ijssis-2017-889","article-title":"Detecting Sybil Attacks In Wireless Sensor Networks Using Sequential Analysis","author":"vamsi","year":"2016","journal-title":"International Journal of Smart Sensing and Intelligent Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/841267"},{"key":"ref14","first-page":"21","article-title":"Detecting sybil nodes in wireless networks with physical layer network coding","author":"wang","year":"2010","journal-title":"IEEE Int Conf Dependable Systems and Networks (DSN)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2645672.2645673"},{"key":"ref16","article-title":"Opportunistic Network Environment Simulator","author":"keranen","year":"2008","journal-title":"Special Assignment Report Helsink University of Technology Department of Communications and Networking"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceu","year":"2002","journal-title":"Proceedings of First International Workshop on Peer-to-Peer Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.69"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221912"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.57"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1116"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b10904"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451013"}],"event":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2016,8,11]]},"location":"Noida, India","end":{"date-parts":[[2016,8,13]]}},"container-title":["2016 Ninth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7875294\/7880185\/07880235.pdf?arnumber=7880235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:36:14Z","timestamp":1568925374000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7880235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ic3.2016.7880235","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}