{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:50:11Z","timestamp":1725709811583},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423644","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"340-343","source":"Crossref","is-referenced-by-count":5,"title":["Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Yousef","family":"Ebrahimi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Younis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364523"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962411"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982656"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.03.001"},{"journal-title":"A terminology for talking about privacy by data minimization Anonymity unlinkability undetectability unobservability pseudonymity and identity management","year":"2010","author":"pfitzmann","key":"2"},{"key":"1","article-title":"On measuring anonymity for wireless mobile ad-hoc networks","author":"huang","year":"2006","journal-title":"The Proceedings of the 31st IEEE Conference on Local Computer Networks"},{"key":"10","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2002","journal-title":"Proc of the Privacy Enhancing Technologies Workshop (PET 2002)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.104"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/11776178_13","article-title":"Using data aggregation to prevent traffic analysis in wireless sensor networks","author":"conner","year":"2006","journal-title":"Proc of the International Conf on Distributed Computing in Sensor Systems (DCOSS'06)"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/SECURECOMM.2005.16","article-title":"Countermeasures against traffic analysis attacks in wireless sensor networks","author":"deng","year":"2005","journal-title":"Proc of 1st Int'l Conf on Security and Privacy for Emerging Areas in Comm Networks"},{"key":"9","article-title":"Towards measuring anonymity","author":"diaz","year":"2002","journal-title":"The Proceedings of the Privacy Enhancing Technologies Workshop (PET 2002)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423644.pdf?arnumber=6423644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T13:07:02Z","timestamp":1562677622000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423644","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}