{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:40:27Z","timestamp":1762623627841},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccs.2014.7024861","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:26:19Z","timestamp":1423157179000},"page":"538-542","source":"Crossref","is-referenced-by-count":6,"title":["An analytical model on eavesdropping attacks in wireless networks"],"prefix":"10.1109","author":[{"given":"Xuran","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Qinglin","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/47.4.432"},{"journal-title":"Antenna Theory Analysis and Design","year":"1997","author":"balanis","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.243"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2026049"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1348"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753607"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1080885.1080887"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-3513-x"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/0470118474"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/760834"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2013.6676462"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115185"},{"journal-title":"Wireless Communications Principles and Practice","year":"2002","author":"rappaport","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183146"}],"event":{"name":"2014 IEEE International Conference on Communication Systems (ICCS)","start":{"date-parts":[[2014,11,19]]},"location":"Macau, China","end":{"date-parts":[[2014,11,21]]}},"container-title":["2014 IEEE International Conference on Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7002494\/7024749\/07024861.pdf?arnumber=7024861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T06:01:10Z","timestamp":1490335270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7024861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccs.2014.7024861","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}