{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:11:47Z","timestamp":1730283107078,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795377","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T21:49:56Z","timestamp":1482788996000},"page":"503-508","source":"Crossref","is-referenced-by-count":4,"title":["Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning"],"prefix":"10.1109","author":[{"given":"James R.","family":"Morris-King","sequence":"first","affiliation":[]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1461-0248.2006.00885.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/srep05659"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/imammb\/dqi003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2015.03.027"},{"key":"ref14","first-page":"149","article-title":"How to Own the Internet in Your Spare Time","author":"staniford","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5120\/13127-0483"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.01.002"},{"article-title":"Towards a Systematic View on Cybersecurity Ecology","year":"2015","author":"mazurczyk","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511629396"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2013.6642449"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062067"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1095714.1095759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2008.1636"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3201\/eid1107.050194"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"ref1","first-page":"28","article-title":"Network-centric warfare: Its origin and future","volume":"124","author":"cebrowski","year":"1998","journal-title":"US Naval Institute Proceedings"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.ppat.1004992"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357465"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"}],"event":{"name":"MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795377.pdf?arnumber=7795377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:23:39Z","timestamp":1483622619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7795377\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795377","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}