{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:33:22Z","timestamp":1725492802702},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/pccc.2012.6407783","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:29:22Z","timestamp":1358454562000},"page":"400-407","source":"Crossref","is-referenced-by-count":1,"title":["Locating jamming attackers in malicious wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Kaiqi","family":"Xiong","sequence":"first","affiliation":[]},{"given":"David","family":"Thuente","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1387663.1387664"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1062689.1062697"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/MNET.2004.1316761"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.adhoc.2005.01.002"},{"key":"3","article-title":"Link-layer jamming attacks on S-MAC","author":"law","year":"0","journal-title":"Proc of EWSN 2005"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1134\/S0361768807040044"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/SAHCN.2009.5168966"},{"year":"2003","author":"rousseeuw","journal-title":"Robust Regression and Outlier Detection","key":"10"},{"key":"7","article-title":"Wireless jamming localization by exploiting nodes' hearing ranges","author":"liu","year":"0","journal-title":"Proceedings of the International Conference on Distributed Computing in Sensor System (DCOSS) 2010"},{"key":"6","article-title":"Localizing jammers in wireless networks","author":"liu","year":"0","journal-title":"Proc Wicom 2009"},{"key":"5","article-title":"Localizing multiple jammers in wireless networks","author":"liu","year":"0","journal-title":"Proc of IEEE ICDCS 2011"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/ICDCS.2007.131"},{"year":"2003","author":"poisel","journal-title":"Modern Communications Jamming Principles and Techniques","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/GLOCOM.2009.5425405"}],"event":{"name":"2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2012,12,1]]},"location":"Austin, TX, USA","end":{"date-parts":[[2012,12,3]]}},"container-title":["2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389872\/6407649\/06407783.pdf?arnumber=6407783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:17:30Z","timestamp":1490206650000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6407783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/pccc.2012.6407783","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}