{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:44:15Z","timestamp":1729647855513,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/iwmn.2015.7322978","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T23:02:40Z","timestamp":1447369360000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A data fusion technique to detect wireless network virtual jamming attacks"],"prefix":"10.1109","author":[{"given":"G.","family":"Escudero-Andreu","sequence":"first","affiliation":[]},{"given":"K. G.","family":"Kyriakopoulos","sequence":"additional","affiliation":[]},{"given":"F. J.","family":"Aparicio-Navarro","sequence":"additional","affiliation":[]},{"given":"D. J.","family":"Parish","sequence":"additional","affiliation":[]},{"given":"D.","family":"Santoro","sequence":"additional","affiliation":[]},{"given":"M.","family":"Vadursi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"45","article-title":"A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment","author":"aparicio-navarro","year":"2012","journal-title":"World Congress on Internet Security (WorldCIS-2012) WorldCIS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.183"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2014.12.015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2011.6032998"},{"key":"ref15","first-page":"276","article-title":"Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection","volume":"15","author":"fragkiadakis","year":"2015","journal-title":"WireI Commun Mob Comput"},{"key":"ref16","article-title":"Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming","author":"chen","year":"2003","journal-title":"ACM MobiCom '03"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167289"},{"journal-title":"Wireshark-Network Protocol Analyzer","year":"0","author":"combs","key":"ref19"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12963-6_13"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/278009.278027"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2694737.2694740"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2506155.2506158"},{"key":"ref9","first-page":"122","article-title":"Early Classification of Network Traffic through Multi-classification","volume":"6613","author":"dainotti","year":"2011","journal-title":"Proc of the 3rd Intern Workshop on Traffic Monitoring and Analysis TMA 2011 Lecture Notes in Computer Science"},{"year":"0","key":"ref20"},{"key":"ref21","first-page":"240","article-title":"A novel framework for jamming detection and classification in wireless networks","author":"dak","year":"2012","journal-title":"Proc of Computing and Networking Tech ICCNT 2012"}],"event":{"name":"2015 IEEE International Workshop on Measurements and Networking (M&N)","start":{"date-parts":[[2015,10,12]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2015,10,13]]}},"container-title":["2015 IEEE International Workshop on Measurements &amp; Networking (M&amp;N)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7309519\/7322959\/07322978.pdf?arnumber=7322978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T00:51:17Z","timestamp":1653526277000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7322978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwmn.2015.7322978","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}