{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:16:01Z","timestamp":1729628161505,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586065","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T20:13:51Z","timestamp":1218053631000},"page":"197-206","source":"Crossref","is-referenced-by-count":2,"title":["Modelling co-operative MAC layer misbehaviour in IEEE 802.11 ad hoc networks with heterogeneous loads"],"prefix":"10.1109","author":[{"given":"Rohith Dwarakanath","family":"Vallam","sequence":"first","affiliation":[]},{"given":"A. Antony","family":"Franklin","sequence":"additional","affiliation":[]},{"given":"C. Siva Ram","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Calculus of Variations","year":"1961","author":"elsgolc","key":"13"},{"journal-title":"UNU RAN - Universal Non-Uniform RANdom number generators","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"journal-title":"Sequential Analysis","year":"1947","author":"wald","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209928"},{"key":"2","article-title":"802.11 denial-of-service attacks: real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"Proceedings of USENIX Security Symposium"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179634"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890136"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730197"},{"key":"6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/JCS-2007-15105","article-title":"detecting ieee 802.11 mac layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers","volume":"15","author":"radosavac","year":"2007","journal-title":"Computers & Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.28"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990077"},{"journal-title":"IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"1997","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1016\/j.comcom.2003.08.019","article-title":"hierarchical analysis of real-media streaming traffic on an ieee 802.11b wireless lan","volume":"27","author":"kuang","year":"2004","journal-title":"Computer Communications Elsevier"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","start":{"date-parts":[[2008,4,1]]},"location":"Berlin, Germany","end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586065.pdf?arnumber=4586065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:41:51Z","timestamp":1497782511000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586065","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}