{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T06:26:46Z","timestamp":1747117606111},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986278","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T16:38:06Z","timestamp":1500568686000},"page":"153-158","source":"Crossref","is-referenced-by-count":29,"title":["Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring"],"prefix":"10.1109","author":[{"given":"Safa","family":"Otoum","sequence":"first","affiliation":[]},{"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[]},{"given":"Hussein T.","family":"Mouftah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"DARPA Intrusion Detection Evaluation","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CICYBS.2009.4925097"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1155\/2014\/608162"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.asoc.2009.06.019"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/FUZZY.2010.5584418"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IWSSIP.2009.5367701"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICC.2009.5199022"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSYST.2014.2301464"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.5120\/7346-0197"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref4","article-title":"Hierarchical trust-based blackhole detection in wsn-based smart grid monitoring","author":"otoum","year":"2017","journal-title":"IEEE InternationalConference on Communications(ICC'17)"},{"year":"0","journal-title":"KDD Cup 1999 data","key":"ref27"},{"year":"0","journal-title":"Communications Requirements of Smart Grid Technologies","key":"ref3"},{"key":"ref6","article-title":"Security and resiliency analytics for smart grids","author":"al-shaer","year":"2016","journal-title":"Advances in Information Security"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TII.2011.2166794"},{"year":"2011","journal-title":"Intrusion Detection Systems","article-title":"Integral misuse and anomaly detection and prevention system","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/JIOT.2014.2366120"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CCECE.2015.7129429"},{"year":"2011","author":"cole","journal-title":"Network Security Bible","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.5121\/ijma.2014.6603"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/IWCMC.2016.7577152"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TSMCC.2008.923876"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SAHCN.2006.288409"},{"key":"ref24","article-title":"An adaptive density-based clustering algorithm for spatial database with noise","author":"ma","year":"0","journal-title":"IEEE International Conference on Data Mining (ICDM'04)"},{"year":"0","journal-title":"Breiman Leo and Cutler Adele Random Forests","key":"ref23"},{"year":"0","journal-title":"The Ns-3 Tutorial","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/S0167-8655(00)00131-8"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2017,6,26]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986278.pdf?arnumber=7986278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T12:06:36Z","timestamp":1502885196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986278","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}