{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:41:49Z","timestamp":1725554509436},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682317","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:08:43Z","timestamp":1294409323000},"page":"138-145","source":"Crossref","is-referenced-by-count":1,"title":["Behavior monitoring framework in large-scale wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.225"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514308"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1280940.1280993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.55"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570688"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460424"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374640"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288514"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref7","article-title":"Modeling node compromise spread in wireless sensor networks using epidemic theory","author":"de","year":"2006","journal-title":"Proc 6 IEEE International Symposium World of Wireless Mobile and Multimedia Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098946"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514310"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"ref20","article-title":"A Realtime Network Traffic Profiling System","author":"xu","year":"2007","journal-title":"Proceedings of International Conference on Dependable Systems and Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-006-0036-z"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682317.pdf?arnumber=5682317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:59:41Z","timestamp":1490072381000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682317","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}