{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:25:04Z","timestamp":1725672304955},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/icc.2011.5963001","type":"proceedings-article","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T01:44:20Z","timestamp":1312422260000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks"],"prefix":"10.1109","author":[{"given":"Francesco Saverio","family":"Proto","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Detti","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Pisa","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/513800.513828"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref12","first-page":"178","article-title":"Context aware detection of selfish nodes in DSR based ad-hoc networks","author":"paul","year":"2002","journal-title":"Proceedings of IEEE Globecom"},{"key":"ref13","article-title":"A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do?","author":"buchegger","year":"2004","journal-title":"Proceedings of IEEE WMCSA 2004"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/775240.775242"},{"year":"0","author":"cordeiro","article-title":"Olsr modules for ns2 (olsr-md, olsr-etx, olsr-ml, olsr)","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.adhoc.2008.10.003"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.adhoc.2008.11.003"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/WIMESH.2010.5507909"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/WONS.2010.5437117"},{"year":"0","article-title":"Guifi.net","key":"ref4"},{"year":"0","article-title":"Ninux.org wireless community network","key":"ref3"},{"key":"ref6","article-title":"Attacks against OLSR: Distributed key management for security","author":"adjih","year":"2005","journal-title":"2005 OLSR Interop and Workshop"},{"key":"ref5","article-title":"Optimized link state routing protocol (OLSR)","author":"clausen","year":"2003","journal-title":"IETF RFC 3626"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1029102.1029106"},{"key":"ref7","article-title":"Securing the OLSR protocol","author":"adjih","year":"2003","journal-title":"Proc 2nd IFIP Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET"},{"year":"0","article-title":"Funkfeuer free net","key":"ref2"},{"year":"0","article-title":"Freifunk: non commercial open initiative to support free radio networks in the German region","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/345910.345955"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFCOM.2001.916283"}],"event":{"name":"ICC 2011 - 2011 IEEE International Conference on Communications","start":{"date-parts":[[2011,6,5]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,6,9]]}},"container-title":["2011 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5962386\/5962409\/05963001.pdf?arnumber=5963001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:59:49Z","timestamp":1490097589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5963001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2011.5963001","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}