{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:16:56Z","timestamp":1762460216846,"version":"3.40.5"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978458","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks"],"prefix":"10.1109","author":[{"given":"Kumar","family":"Murugesan","sequence":"first","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]},{"given":"Muralidhara","family":"VN","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology Bangalore,Bengaluru,India"}]},{"given":"Tirth","family":"Master","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"volume-title":"Internet of Things Mar-ket Analysis - 2032","year":"2024","key":"ref1"},{"journal-title":"IEEE Standard for Low-Rate Wireless Networks, IEEE Std 802.15.4\u20132015 (Revision of IEEE Std 802.15.4-2011)","first-page":"1","year":"2016","key":"ref2"},{"volume-title":"Thread Specification","year":"2024","key":"ref3"},{"article-title":"Mesh Link Establishment","volume-title":"Draft-ietf-tilo-mesh-link-establishment-On","year":"2016","key":"ref4"},{"article-title":"J-PAKE: Password-Authenticated Key Exchange by Juggling","volume-title":"RFC 8236","year":"2017","key":"ref5"},{"article-title":"Schnorr Non-interactive Zero-Knowledge Proof","volume-title":"RFC 8235","year":"2017","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2844955"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.73-97"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528544"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS59351.2024.10426916"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICARC57651.2023.10145748"},{"volume-title":"Simulating a Thread Network with OpenThread","year":"2025","key":"ref12"},{"volume-title":"Run OTBR Docker","year":"2025","key":"ref13"},{"volume-title":"Tcpreplay - Pcap Editing and Replaying Utilities","year":"2025","key":"ref14"},{"volume-title":"Pyspinel","year":"2025","key":"ref15"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978458.pdf?arnumber=10978458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:34:25Z","timestamp":1746858865000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978458","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}