{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:01:41Z","timestamp":1725519701495},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/malware.2008.4690863","type":"proceedings-article","created":{"date-parts":[[2008,12,9]],"date-time":"2008-12-09T13:03:19Z","timestamp":1228827799000},"page":"92-97","source":"Crossref","is-referenced-by-count":1,"title":["State of wireless security implementations in the United States and Europe - empirical data"],"prefix":"10.1109","author":[{"given":"Fernando C. Colon","family":"Osorio","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2002.994932"},{"key":"2","article-title":"comparison of security protocols in mobile wireless environments: tradeoff's between level of security obtained and battery life","author":"colon osorio","year":"2005","journal-title":"First lEEE\/Create-Net Workshop on Security and QoS in Communication Networks"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1142\/9789812799562_0013","article-title":"your 802.11 wireless network has no clothes","author":"arbaugh","year":"2001","journal-title":"First IEEE International Conference on Wireless LANs and Home Networks"},{"key":"7","first-page":"1","article-title":"weaknesses in the key scheduling algorithm of rc4","author":"fluhrer","year":"0","journal-title":"Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography Springer-Verlag 2001 isbn 3-540-430660"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"journal-title":"Keep The Bad Guys Out of Your 802 11 Wireless Network How To Secure Your 802 11 Wireless Data Collection Network","year":"2003","key":"4"},{"journal-title":"Research In Motion Reports Fourth Quarter and Year-End Results for Fiscal 2008","year":"0","key":"9"},{"key":"8","article-title":"hey neighbor, stop piggybacking on my wireless network","author":"marriott","year":"0","journal-title":"New York Times"}],"event":{"name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2008,10,7]]},"location":"Alexandria, VA, USA","end":{"date-parts":[[2008,10,8]]}},"container-title":["2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4686744\/4690850\/04690863.pdf?arnumber=4690863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:32:58Z","timestamp":1497781978000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4690863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/malware.2008.4690863","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}