{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:32:33Z","timestamp":1730233953730,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579473","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Mitigating Blackhole attack of Underwater Sensor Networks"],"prefix":"10.1109","author":[{"given":"Dhruvi","family":"Zala","sequence":"first","affiliation":[]},{"given":"Dhaval","family":"Thummar","sequence":"additional","affiliation":[]},{"given":"B. R.","family":"Chandavarkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iccsp.2013.6577120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9812135"},{"journal-title":"IEEE 6th International Conference on Mobile Adhoc and Sensor Systems MASS 2009","year":"2009","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2014.6909194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2011.6075136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986560"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.56"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS.2014.6804514"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2864127"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1307-4_4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.3390\/s18113907","article-title":"Challenges, threats, security issues and new trends of underwater wireless sensor networks","volume":"18","author":"yang","year":"2018","journal-title":"SENSORS"},{"key":"ref6","first-page":"551","article-title":"A systematic survey on software-defined networks, routing protocols and security infrastructure for underwater wireless sensor networks (uwsns)","author":"rao","year":"2020","journal-title":"Emerging Research in Data Engineering Systems and Computer Communications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.2014.7003044"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7180508"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2017.2716599"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2010.110"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11097\/SUTC.2006.1636203"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1307-4_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEICT.2015.7307516"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.01.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754963"},{"key":"ref24","first-page":"1","article-title":"Mitigating black hole attacks in wireless sensor networks using node-resident expert systems","author":"taylor","year":"0","journal-title":"2014 IEEE Wireless Telecommunications Symposium"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1098\/rsta.2011.0214","article-title":"Underwater sensor networks: applications, advances and challenges","volume":"370","author":"heidemann","year":"1958","journal-title":"Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACEA.2015.7164689"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579473.pdf?arnumber=9579473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:41Z","timestamp":1652201741000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579473\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579473","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}