{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:43:15Z","timestamp":1729654995955,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/latincom.2015.7430126","type":"proceedings-article","created":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T16:48:52Z","timestamp":1457628532000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Protecting Wireless Mesh Networks through a distributed intrusion prevention framework"],"prefix":"10.1109","author":[{"given":"Oscar","family":"Rodas","sequence":"first","affiliation":[]},{"given":"Marco Antonio","family":"To","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Alvarez","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Maag","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Snort","year":"2004","author":"roesch","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2152","DOI":"10.1109\/VETECF.2003.1285405","article-title":"Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols","volume":"3","author":"anjum","year":"2003","journal-title":"Vehicular Technology Conference 2003 VTC 2003-Fall 2003 IEEE 58th"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614355"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2010049"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.38"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CICSyN.2010.51"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"key":"ref19","article-title":"Airids architecture and methodology","author":"munn","year":"2001","journal-title":"AirIDS Tech Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref3","first-page":"304","article-title":"Performance enhancement of intrusion detection systems using advances in sensor fusion","author":"thomas","year":"2009","journal-title":"Supercomputer Education and Research Centre Indian Institute of Science"},{"journal-title":"Cisco Tech Rep","article-title":"Cisco 2014 - annual security report","year":"2014","key":"ref6"},{"key":"ref5","article-title":"A novel classification-based hybrid ids","author":"rodas","year":"2014","journal-title":"ASE 360 Open Scientific Digital Library"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396943"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/WAINA.2015.107","article-title":"DOCKEMU - A network emulation tool","author":"to","year":"2015","journal-title":"29th IEEE International Conference on Advanced Information Networking and Applications Workshops AINA 2015 Workshops"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364148"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1403007.1403022"},{"journal-title":"loudfatbloke team","article-title":"Widz","year":"2003","key":"ref20"},{"journal-title":"Tech Rep","article-title":"Checkpoint 2014 - security report","year":"2014","key":"ref22"},{"article-title":"mongodb","year":"2009","author":"ryan","key":"ref21"},{"key":"ref24","article-title":"Passive security threats and consequences in ieee 802.11 wireless mesh networks","volume":"2","author":"khan","year":"2008"},{"journal-title":"SANS Institute Tech Rep","article-title":"How ddos detection and mitigation can fight advanced targeted attacks","year":"2013","key":"ref23"},{"key":"ref25","article-title":"Optimized Link State Routing Protocol (OLSR)","author":"clausen","year":"2003","journal-title":"RFC 3626 (Experimental) Internet Engineering Task Force"}],"event":{"name":"2015 7th IEEE Latin-American Conference on Communications (LATINCOM)","start":{"date-parts":[[2015,11,4]]},"location":"Arequipa","end":{"date-parts":[[2015,11,6]]}},"container-title":["2015 7th IEEE Latin-American Conference on Communications (LATINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422343\/7430110\/07430126.pdf?arnumber=7430126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T08:07:44Z","timestamp":1567670864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7430126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/latincom.2015.7430126","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}