{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T05:20:49Z","timestamp":1735795249604,"version":"3.32.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,27]]},"DOI":"10.1109\/itnac62915.2024.10815546","type":"proceedings-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:24:34Z","timestamp":1735673074000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards WRSN Security: Probabilistic Approach for Malicious Node Identification"],"prefix":"10.1109","author":[{"given":"Ayush","family":"Verma","sequence":"first","affiliation":[{"name":"Netaji Subhas University of Technology,Department of Computer Science and Engineering,New Delhi,India,110078"}]},{"given":"Tanuj","family":"Chandela","sequence":"additional","affiliation":[{"name":"Netaji Subhas University of Technology,Department of Computer Science and Engineering,New Delhi,India,110078"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Detection of Hello Flood Attack on Leach Protocol Based on Energy of Attacker Node","volume":"4","author":"Jyoti","year":"2015","journal-title":"International Journal of Innovations & Advancement in Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IT-DREPS.2017.8277813"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.135"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1007\/s11276-022-03004-x","article-title":"A state-of-the-art survey on wireless rechargeable sensor networks: perspectives and challenges","volume":"28","author":"Qureshi","year":"2022","journal-title":"Wireless Netw"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292831"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-17656-7","volume-title":"Wireless Rechargeable Sensor Networks","author":"Yang","year":"2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ic3iot53935.2022.9767932"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737403"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016908589"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icct59356.2023.10419390"},{"key":"ref12","first-page":"1882","article-title":"A survey in hello flood attack in wireless sensor networks","volume":"3","author":"Akhil","year":"2014","journal-title":"Int. J. Eng. Res. Technol"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103943"},{"volume-title":"xxHash - Extremely fast non-cryptographic hash algorithm","year":"2013","author":"Collet","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418393"},{"volume-title":"Security in wireless networks","author":"Giruka","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cesys.2018.8724033"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INDISCON58499.2023.10270347"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/sita60746.2023.10373698"}],"event":{"name":"2024 34th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2024,11,27]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,11,29]]}},"container-title":["2024 34th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10815099\/10815127\/10815546.pdf?arnumber=10815546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T08:20:03Z","timestamp":1735719603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10815546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itnac62915.2024.10815546","relation":{},"subject":[],"published":{"date-parts":[[2024,11,27]]}}}