{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:00:36Z","timestamp":1725429636141},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423614","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"224-227","source":"Crossref","is-referenced-by-count":0,"title":["Protecting IEEE 802.11s wireless mesh networks against insider attacks"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Reinhardt","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Seither","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Konig","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Steinmetz","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","article-title":"IEEE 802.11-2007","year":"2007","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.131"},{"journal-title":"Attack trees Modeling security threats","year":"0","author":"schneier","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735731"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1947950"},{"key":"5","article-title":"A secure hybrid wireless mesh protocol for 802.11s mesh network","author":"islam","year":"2008","journal-title":"Proceedings of the International Conference on Computational Science and Its Applications (ICCSA)"},{"journal-title":"Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications - Amendment Mesh Networking","article-title":"IEEE 802.11s-2011","year":"2011","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"key":"8","article-title":"Ad hoc on-demand distance vector routing, rfc 3561","author":"perkins","year":"2003","journal-title":"Internet Engineering Task Force"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423614.pdf?arnumber=6423614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:28:47Z","timestamp":1490142527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423614\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423614","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}