{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:47:12Z","timestamp":1730227632222,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554702","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"2136-2141","source":"Crossref","is-referenced-by-count":4,"title":["Survey of Rank Attack Detection Algorithms in Internet of Things"],"prefix":"10.1109","author":[{"given":"S.","family":"Kalyani","sequence":"first","affiliation":[]},{"given":"D.","family":"Vydeki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"journal-title":"TRAIL topology authentication in RPL","year":"2013","author":"perrey","key":"ref3"},{"key":"ref6","first-page":"3711","article-title":"Rank attack using an objective function in RPL for low power and lossy networks","volume":"13","author":"rehman","year":"2013","journal-title":"IEEE Sensors Journal"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2011.6098218"},{"key":"ref8","article-title":"Intrusion Detection Systems","volume":"2","author":"bace","year":"2001","journal-title":"Journal of Information Security"},{"key":"ref7","article-title":"An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols","volume":"2","author":"anand","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554702.pdf?arnumber=8554702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:17:20Z","timestamp":1643289440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554702","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}