{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:19:26Z","timestamp":1730272766896,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iscc.2015.7405617","type":"proceedings-article","created":{"date-parts":[[2016,2,16]],"date-time":"2016-02-16T00:54:13Z","timestamp":1455584053000},"page":"835-840","source":"Crossref","is-referenced-by-count":0,"title":["Identification of wireless network cards based on signatures of wireless traffic"],"prefix":"10.1109","author":[{"given":"SiTong","family":"Mao","sequence":"first","affiliation":[]},{"given":"Paolo Emilio","family":"Barbano","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INCOS.2010.24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.11.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2012.186"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.227"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2013.111"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311287"},{"key":"ref6","first-page":"12","article-title":"Misbehaviour analysis of 802.11 mobile ad-hoc networks contention window cheating","author":"szott","year":"2007","journal-title":"Med Hoc Net"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599216"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.02.092026"},{"key":"ref2","article-title":"Thwarting selfish behavior in 802.11 wlans","volume":"abs 1311 6280","author":"banchs","year":"2013","journal-title":"CoRR"},{"year":"2014","key":"ref1","article-title":"Cisco visual networking index: Forecast and methodology (2013&#x2013;2018)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"}],"event":{"name":"2015 20th IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2015,7,6]]},"location":"Larnaca","end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7397314\/7405441\/07405617.pdf?arnumber=7405617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T07:16:17Z","timestamp":1490339777000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7405617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscc.2015.7405617","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}