{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:14:14Z","timestamp":1729638854612,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/iccnc.2012.6167537","type":"proceedings-article","created":{"date-parts":[[2012,8,15]],"date-time":"2012-08-15T20:14:52Z","timestamp":1345061692000},"page":"815-819","source":"Crossref","is-referenced-by-count":11,"title":["PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA"],"prefix":"10.1109","author":[{"given":"Xianglin","family":"Wei","sequence":"first","affiliation":[]},{"given":"Tarem","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Al-Sakib Khan","family":"Pathan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Intruder detection in camera networks using the one-class neighbor machine","author":"ahmed","year":"0","journal-title":"Proc American Telecommunications Systems Management Association (ATSMA) Networking and Electronic Commerce Research Conf (NAEC) Riva del Garda Italy Oct 2011"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/INFCOM.2007.79"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/GLOCOM.2009.5425504"},{"key":"13","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1111\/j.2517-6161.1995.tb02032.x","article-title":"Wavelet shrinkage: Asymptopia?","volume":"57","author":"donoho","year":"1995","journal-title":"J Royal Statist Soc"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1015467.1015492"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/945472.945475"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1592451.1592452"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/ICDCS.2007.84"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/775240.775242"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/ICDCS.2010.90"},{"year":"0","journal-title":"Portal [Online]","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/CSSE.2008.505"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1016\/j.comnet.2005.07.025"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1002\/aic.690440712"},{"key":"4","article-title":"The sybil attack","author":"douceur","year":"0","journal-title":"Proc Int Workshop on Peer-to-Peer Systems Cambridge MA USA Mar 2007"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ISCIT.2010.5664851"},{"year":"0","journal-title":"Portal [Online]","key":"8"}],"event":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2012,1,30]]},"location":"Maui, HI, USA","end":{"date-parts":[[2012,2,2]]}},"container-title":["2012 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6163567\/6167355\/06167537.pdf?arnumber=6167537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T12:46:08Z","timestamp":1714308368000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6167537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2012.6167537","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}