{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T19:01:39Z","timestamp":1751655699534,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/lcn.2014.6925790","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:15:47Z","timestamp":1414008947000},"page":"345-353","source":"Crossref","is-referenced-by-count":4,"title":["Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection"],"prefix":"10.1109","author":[{"given":"Rodrigo","family":"do Carmo","sequence":"first","affiliation":[]},{"given":"Justus","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Willert","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.374"},{"journal-title":"Pattern Recognition Machine Learning (Information Science and Statistics","year":"2006","author":"bishop","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614355"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986876"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1400219"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463187"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.210"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185460"},{"key":"10","article-title":"Effective intrusion detection using multiple sensors in wireless ad hoc networks","author":"kachirski","year":"2003","journal-title":"Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1147\/sj.413.0372"},{"key":"5","article-title":"Realtime problem determination in distributed systems using active probing","author":"rish","year":"2004","journal-title":"IEEE\/IFIP Network Operations and Management Symposium (NOMS) IEEE"},{"key":"4","article-title":"Analyzing active probing for practical intrusion detection in wirel ess multihop networks","author":"do carmo","year":"2014","journal-title":"Proceedings of the 11th IEEE\/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS '14) IEEE\/IFIP"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/11856214_13","article-title":"DEMEM: Distributed evidence-driven message exchange intrusion detection model for manet","volume":"4219","author":"tseng","year":"2006","journal-title":"Recent Advances in Intrusion Detection Ser Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"}],"event":{"name":"2014 IEEE 39th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2014,9,8]]},"location":"Edmonton, AB","end":{"date-parts":[[2014,9,11]]}},"container-title":["39th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6916486\/6925725\/06925790.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6916486\/6925725\/06925790.pdf?arnumber=6925790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:52:21Z","timestamp":1498171941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6925790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/lcn.2014.6925790","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}