{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T07:51:06Z","timestamp":1771833066418,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/medcomnet49392.2020.9191503","type":"proceedings-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:21:21Z","timestamp":1599772881000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents"],"prefix":"10.1109","author":[{"given":"Christiana","family":"Ioannou","sequence":"first","affiliation":[]},{"given":"Vasos","family":"Vassiliou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref30","article-title":"The Hunt for Viral Processes","author":"ioannou","year":"2003","journal-title":"Master&#x2019;s thesis"},{"key":"ref10","first-page":"118","article-title":"Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks","volume":"9","author":"moon","year":"2009","journal-title":"IJC-SNS International Journal of Computer Science and Network Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2012.6240521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.89"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389098"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref17","first-page":"113","article-title":"Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures","author":"karlof","year":"2002","journal-title":"First IEEE International Workshop on Sensor Network Protocols and Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6040-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2016.009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2010.49"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77871-4_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.burns.2015.08.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655254"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2017.7998271"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928414"},{"key":"ref9","article-title":"Code of practice for consumer iot security","year":"2018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1005817.1005828"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref22","year":"2006","journal-title":"Tmote Sky Ultra Low Power IEEE 802 15 4 Compliant Wireless Sensor Module"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"ref24","first-page":"1","article-title":"Detecting crypto-ransomware in IoT networks based on energy consumption footprint","author":"azmoodeh","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2989293.2989305"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.029"}],"event":{"name":"2020 Mediterranean Communication and Computer Networking Conference (MedComNet)","location":"Arona, Italy","start":{"date-parts":[[2020,6,17]]},"end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9186748\/9191448\/09191503.pdf?arnumber=9191503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:01Z","timestamp":1656453181000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9191503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/medcomnet49392.2020.9191503","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}