{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:14:20Z","timestamp":1730304860452,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/wcnc.2018.8377317","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T23:24:55Z","timestamp":1528759495000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Exploring the behaviors and threats of pollution attack in cooperative MEC caching"],"prefix":"10.1109","author":[{"given":"Chang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hongjia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.jnca.2016.05.003","article-title":"An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks","volume":"69","author":"el","year":"2016","journal-title":"J Network and Computer Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2635637"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.020"},{"journal-title":"C-RAN work group","article-title":"From C-RAN to S-RAN","year":"2017","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996468"},{"key":"ref12","article-title":"An efficient distributed algorithm for computing minimal hitting sets","author":"cardoso","year":"2014","journal-title":"Proc of IWP"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1109\/TIFS.2016.2574307","article-title":"Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking","volume":"11","author":"haoran","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0391-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736753"},{"key":"ref9","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"Proc IEEE InfoCom"},{"journal-title":"3GPP","article-title":"System Architecture for the 5G System","year":"2017","key":"ref1"}],"event":{"name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2018,4,15]]},"location":"Barcelona","end":{"date-parts":[[2018,4,18]]}},"container-title":["2018 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8370761\/8376943\/08377317.pdf?arnumber=8377317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T01:17:18Z","timestamp":1530580638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8377317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2018.8377317","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}