{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:14:29Z","timestamp":1725804869492},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/milcom.2012.6415755","type":"proceedings-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T17:24:53Z","timestamp":1359653093000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Best-effort Data Leakage Prevention in inter-organizational tactical MANETs"],"prefix":"10.1109","author":[{"given":"Johan","family":"Sigholm","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Raciti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Multiple Services in Heterogeneous Ad Hoc Networks","year":"2009","author":"gro?nkvist","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.52"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.071411.102123"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090106"},{"key":"16","article-title":"MITE - MANET intrusion detection for tactical environments","author":"jahnke","year":"2008","journal-title":"Proc NATO\/RTO Research Symposium on Information Assurance for Emerging and Future Military Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-851-4.ch001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.008"},{"key":"11","article-title":"Data leakage protection thoughts","author":"bejtlich","year":"2009","journal-title":"TaoSecurity"},{"journal-title":"Six Myths of Information Security","year":"2009","author":"rowney","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1145\/235968.233324","article-title":"BIRCH: An efficient data clustering method for very large databases","author":"zhang","year":"1996","journal-title":"Proc Int l Conf Management of Data (SIGMOD)"},{"key":"20","article-title":"ADWICE: Anomaly detection with real-time incremental clustering","author":"burbeck","year":"2004","journal-title":"Proc 7th Int Conf on Inform Security and Cryptology (ICISC 04)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2007.02.004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28920-0_6"},{"journal-title":"OPNET Modeler","year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454880"},{"key":"26","article-title":"Towards next-generation intrusion detection","author":"koch","year":"2011","journal-title":"Proc 3rd Int Conf on Cyber Conflict"},{"key":"3","article-title":"Military technology for resourcelimited time-sensitive targeting","author":"lo?fgren","year":"2010","journal-title":"Proc 2010 Symposium on Military Sciences"},{"key":"2","article-title":"Hastily formed networks for disaster response: Technical heterogeneity and virtual pockets of local order","author":"to?rnqvist","year":"2009","journal-title":"Proc 6th Int Conf on Information Systems for Crisis Response and Management (ISCRAM2009)"},{"journal-title":"A Comparative Analysis of Network Approaches for Tactical Wireless Communications Validated by Joint Communication Simulation System (JCSS) Simulations A Swedish Perspective","year":"2011","author":"maxe?n","key":"10"},{"key":"1","article-title":"Inside the army's doomed quest for the 'perfect' radio","author":"axe","year":"2012","journal-title":"Wired Magazine"},{"journal-title":"IT Security in GRTS Risk Inventory and Scenarios","year":"2010","author":"hunstad","key":"7"},{"journal-title":"Letter to the United States Congress Pursuant to the Termination of the JTRS GMR Program","year":"2011","author":"kendall","key":"6"},{"key":"5","article-title":"How to blow $6 billion on a tech project","author":"gallagher","year":"2012","journal-title":"ARS Technica"},{"key":"4","article-title":"Reconfigurable radio systems: Towards secure collaboration for peace support and public safety","author":"sigholm","year":"2010","journal-title":"Proc 9th European Conference on Information Warfare and Security (ECIW 2010)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127521"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.117"}],"event":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","start":{"date-parts":[[2012,10,29]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,11,1]]}},"container-title":["MILCOM 2012 - 2012 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6383191\/6415559\/06415755.pdf?arnumber=6415755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:46:11Z","timestamp":1498027571000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6415755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/milcom.2012.6415755","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}