{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:46:11Z","timestamp":1725417971497},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/lcn.2014.6925784","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:15:47Z","timestamp":1413994547000},"page":"296-304","source":"Crossref","is-referenced-by-count":6,"title":["Measuring the impact of denial-of-service attacks on wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Michael","family":"Riecker","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Thies","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"16","article-title":"How does your password measure up? the effect of strength meters on password creation","author":"ur","year":"2012","journal-title":"Usenix Security"},{"key":"13","article-title":"Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels","author":"ceriotti","year":"2011","journal-title":"IPSN"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644040"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935312"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236395"},{"key":"1","article-title":"Time-critical data delivery in wireless sensor networks","author":"suriyachai","year":"2010","journal-title":"DCOSS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/958492.958493"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236423"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195801"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934989"},{"key":"8","article-title":"Experimental study of the impact of WLAN interference on","author":"hauer","year":"2009","journal-title":"IEEE 802 15 4 Body Area Networks EWSN"}],"event":{"name":"2014 IEEE 39th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2014,9,8]]},"location":"Edmonton, AB","end":{"date-parts":[[2014,9,11]]}},"container-title":["39th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6916486\/6925725\/06925784.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6916486\/6925725\/06925784.pdf?arnumber=6925784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:37:53Z","timestamp":1490283473000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6925784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcn.2014.6925784","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}