{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:47:51Z","timestamp":1761648471586,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024697","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T20:26:54Z","timestamp":1504556814000},"page":"1257-1262","source":"Crossref","is-referenced-by-count":33,"title":["An effective Stackelberg game for high-assurance of data trustworthiness in WSNs"],"prefix":"10.1109","author":[{"given":"Mohamed S.","family":"Abdalzaher","sequence":"first","affiliation":[]},{"given":"Karim","family":"Seddik","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Muta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1336"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.78"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024586"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/s16071003","article-title":"Game theory meets wireless sensor networks security requirements and threats mitigation: A survey","volume":"16","author":"abdalzaher","year":"2016","journal-title":"SENSORS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2613546"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2590438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2014.6850303"},{"journal-title":"Game Theory in Wireless and Communication Networks Theory Models and Applications","year":"2012","author":"han","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.3.521-532"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2015.09.006","article-title":"A survey on wireless sensor networks for smart grid","author":"fadel","year":"2015","journal-title":"Computer Communications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2015.7127816"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2481722"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444900"},{"key":"ref7","article-title":"Packet size optimization in wireless sensor networks for smart grid applications","author":"kurt","year":"2016","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2005.1507522"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref9","first-page":"538","article-title":"A simplified stackelberg game approach for securing data trustworthiness in wireless sensor networks","author":"abdalzaher","year":"2016","journal-title":"Institute of Electronics Information and Communication Engineers (IEICE) General Conference B-18&#x2013;40"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024697.pdf?arnumber=8024697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T03:51:56Z","timestamp":1570074716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024697","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}