{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:36:25Z","timestamp":1730302585331,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/vitae.2014.6934449","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T04:54:04Z","timestamp":1414817644000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Smart integration of cloud computing and MCMC based secured WSN to monitor environment"],"prefix":"10.1109","author":[{"given":"Muhammad R.","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Hongyan","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/857076.857078"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1198\/10618600152627924"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/SENSORCOMM.2009.76"},{"key":"18","first-page":"326","article-title":"The intrusion detection method based on game theory in wireless sensor network","author":"ma","year":"2008","journal-title":"2008 First IEEE International Conference on Ubi-Media Computing"},{"key":"15","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of the 6th annual international conference on Mobile computing and networking"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/345910.345958"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1093\/biomet\/86.3.710"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/570753.570756"},{"key":"11","first-page":"427","article-title":"A taxonomy of internal attacks in wireless sensor network","author":"ahmed","year":"2012","journal-title":"World Academy of Science Engineering and Technology"},{"key":"12","first-page":"148","article-title":"A novel framework for abnormal behaviour identification and detection for wireless sensor networks","volume":"6","author":"ahmed","year":"2012","journal-title":"International Journal of Computer and Communication Engineering"},{"key":"21","first-page":"1","article-title":"Markov chain monte carlo-based approaches for modeling the spatial survival with conditional autoregressive (car) frailty","volume":"10","author":"iriawan","year":"2012","journal-title":"Ternational Journal of Computer Science and Network Security"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/SAM.2002.1191063"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/2295136.2295164"},{"key":"2","first-page":"17","article-title":"Detection, classification, and tracking of targets","volume":"19","author":"li","year":"0","journal-title":"IEEE Signal Processing Magazine"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/ICOIN.2012.6164340"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/CTS.2010.5478459"},{"key":"7","first-page":"1","article-title":"Wireless sensor networks: A new computing platform for tomorrow's Internet","volume":"1","author":"zhao","year":"2004","journal-title":"Proc IEEE 6th Circuits Systems Symp Emerging Technologies Frontiers Mobile Wireless Communication 2004"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/IPSN.2006.243938"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/JPROC.2003.814926"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/990064.990096"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ITC.2010.88"},{"year":"2009","author":"armbrust","journal-title":"Above the Clouds A Berkeley View of Cloud Computing","key":"8"}],"event":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6917160\/6934393\/06934449.pdf?arnumber=6934449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:40:18Z","timestamp":1490308818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/vitae.2014.6934449","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}