{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:57:19Z","timestamp":1725631039963},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754965","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000312-000317","source":"Crossref","is-referenced-by-count":1,"title":["Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services"],"prefix":"10.1109","author":[{"given":"Christos","family":"Liaskos","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Papadimitriou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The AnyLogic Simulator","year":"2013","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1007049"},{"key":"18","first-page":"294","article-title":"CAPTCHA: Using hard Al problems for security","author":"ahn","year":"2003","journal-title":"Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques"},{"journal-title":"Quickest Detection","year":"2009","author":"poor","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/9.793723"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1214\/07-AAP463"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/288235"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.1997.601342"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(00)00633-6"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983941"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2307\/2285509"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1125274.1125276"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0127-z"},{"key":"10","article-title":"On-demand broadcast: New challenges and scheduling algorithms","author":"sharaf","year":"2002","journal-title":"Proc of the 1st Hellenic Conference on the Management of Data"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00112"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1753326"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/90.811450"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2011.2163449"},{"key":"9","first-page":"1847","article-title":"Scheduling algorithms for videotex systems under broadcast delivery","author":"dykeman","year":"1986","journal-title":"Proceedings of the 1nternational Conference on Communications (lCC86)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.04.006"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754965.pdf?arnumber=6754965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:11:10Z","timestamp":1490274670000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754965","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}