{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:05:49Z","timestamp":1730275549869,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isncc.2019.8909123","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T19:01:09Z","timestamp":1574708469000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Nazli","family":"Siasi","sequence":"first","affiliation":[]},{"given":"Adel","family":"Aldalbahi","sequence":"additional","affiliation":[]},{"given":"Mohammed A.","family":"Jasim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5535004"},{"key":"ref11","article-title":"An energy balanced algorithm of LEACH protocol in WSN","volume":"10","author":"fu","year":"2013","journal-title":"International Journal of Computer Science (IJCSI)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2017.8068715"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2104317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/26.241748"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292238"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WAMICON.2018.8363900"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690705"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s150100440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500448"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906373"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2008.13"},{"key":"ref7","article-title":"Detecting selective forwarding attacks in wireless sensor networks","author":"yu","year":"2006","journal-title":"Parallel and Distributed Processing Symposium (IPDPS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2526601"},{"key":"ref9","article-title":"Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks","volume":"12","author":"crosby","year":"2011","journal-title":"International Journal of Network Security (IJNS)"}],"event":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2019,6,18]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2019,6,20]]}},"container-title":["2019 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8894812\/8909084\/08909123.pdf?arnumber=8909123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:50Z","timestamp":1658094830000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isncc.2019.8909123","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}