{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:46:55Z","timestamp":1725720415118},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icnsc.2008.4525394","type":"proceedings-article","created":{"date-parts":[[2008,5,20]],"date-time":"2008-05-20T20:11:19Z","timestamp":1211314279000},"page":"1174-1178","source":"Crossref","is-referenced-by-count":3,"title":["VSCF: A Vote-based Secure Cluster Formation Scheme"],"prefix":"10.1109","author":[{"given":"Wen Cheng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yi Ying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kee Bum","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dong Sub","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Min Yu","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Myong-Soon","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"lad: localization anomaly detection for wireless sensor networks","author":"du","year":"2005","journal-title":"Proc of the 19th IEEE Int Parallel & Distributed rocessing Symposium"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290173"},{"key":"12","first-page":"9","article-title":"secure media access control (mac) in wireless sensor networks: intrusion detections and coutermeasures","author":"ren","year":"2004","journal-title":"IEEE Int Symp Personal Indoor Mobile Radio Comm"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"article-title":"constraints and approaches for distributed sensor networks security","year":"2000","author":"carman","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/570645.570664","article-title":"a two-tier data dissemination protocol for large-scale wireless sensor networks","author":"ye","year":"2002","journal-title":"proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM)"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.48"},{"year":"0","key":"5"},{"key":"4","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"8","article-title":"heinzelman, anantha p. chandrakasan, and harint alakrishnau: an application-specific protocol architecture for wireless microsensor networks","author":"wendi","year":"1999","journal-title":"Proc 5th ACM\/IEEE Mobicom Conference"}],"event":{"name":"2008 IEEE International Conference on Networking, Sensing and Control (ICNSC '08)","start":{"date-parts":[[2008,4,6]]},"location":"Sanya","end":{"date-parts":[[2008,4,8]]}},"container-title":["2008 IEEE International Conference on Networking, Sensing and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4489617\/4525150\/04525394.pdf?arnumber=4525394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T14:55:58Z","timestamp":1708959358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4525394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2008.4525394","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}