{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:55:57Z","timestamp":1729677357194,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/icnsc.2016.7478978","type":"proceedings-article","created":{"date-parts":[[2016,5,26]],"date-time":"2016-05-26T20:26:53Z","timestamp":1464294413000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Towards better selective forwarding and delay attacks detection in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Martin","family":"Stehlik","sequence":"first","affiliation":[]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[]},{"given":"Andriy","family":"Stetsko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Towards intrusion detection in wireless sensor networks","author":"krontiris","year":"2007","journal-title":"Proc of the 13th European Wireless Conference"},{"article-title":"DOLPHIN project-team. ParadisEO - A Software for Metaheuristics","year":"2013","author":"lille","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.07.023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2008.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.52"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378943"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s11276-006-0724-8","article-title":"Relay sensor placement in wireless sensor networks","volume":"14","author":"cheng","year":"2007","journal-title":"Wireless Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.80"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1002\/9780470496916","author":"talbi","year":"2009","journal-title":"Metaheuristics From Design to Implementation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7551\/978-0-262-31709-2-ch082"},{"key":"ref8","article-title":"SPEA2: improving the strength pareto evolutionary algorithm","author":"zitzler","year":"2001","journal-title":"Eidgen&#x00F6;ssische Technische Hochschule Z&#x00FC;rich (ETH) Tech Rep"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_21"},{"key":"ref9","first-page":"119","author":"matyas","year":"2015","journal-title":"Cyber Physical Systems Chapter 5 WSNProtectLayer - security mid-dleware for wireless sensor networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199399"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2016.7478978"},{"key":"ref24","first-page":"8","article-title":"Detecting selective forwarding attacks in wireless sensor networks","author":"yu","year":"2006","journal-title":"20th International Parallel and Distributed Processing Symposium 2006 IPDPS 2006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12400-1_29"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/4235.797969"}],"event":{"name":"2016 IEEE 13th International Conference on Networking, Sensing and Control (ICNSC)","start":{"date-parts":[[2016,4,28]]},"location":"Mexico City, Mexico","end":{"date-parts":[[2016,4,30]]}},"container-title":["2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7470729\/7478962\/07478978.pdf?arnumber=7478978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T04:57:46Z","timestamp":1718600266000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7478978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2016.7478978","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}