{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:45:49Z","timestamp":1729647949091,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wiopt.2009.5291575","type":"proceedings-article","created":{"date-parts":[[2009,12,18]],"date-time":"2009-12-18T18:16:59Z","timestamp":1261160219000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Using the IEEE 802.11 Frame Check Sequence as a pseudo random number for packet sampling in wireless networks"],"prefix":"10.1109","author":[{"given":"S.","family":"Raynel","sequence":"first","affiliation":[]},{"given":"A.","family":"McGregor","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jorgensen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wireless-I traceset","year":"2008","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023660"},{"year":"0","key":"11"},{"key":"12","article-title":"Statistical testing of random number generators","author":"soto","year":"1999","journal-title":"20th National Information Systems Security Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/90.929851"},{"key":"2","first-page":"392","volume":"1","author":"chakravarti","year":"1967","journal-title":"Handbook of Methods of Applied Statistics"},{"journal-title":"ANSI\/IEEE Std 802 11-1997 Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"1997","key":"1"},{"journal-title":"Radiotap","year":"0","key":"10"},{"key":"7","first-page":"259","article-title":"The bsd packet filter: A new architecture for user-level packet capture","author":"mccanne","year":"1993","journal-title":"USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings"},{"journal-title":"MADWiFi","year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_9"},{"key":"4","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/11856214_14","article-title":"Enhancing network intrusion detection with integrated sampling and filtering","volume":"4219","author":"gonzales","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"R A Language and Environment for Statistical Computing","year":"2008","key":"9"},{"key":"8","article-title":"A comparative experimental study of hash functions applied to packet sampling","author":"molina","year":"2005","journal-title":"ITC-19"}],"event":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt 2009","start":{"date-parts":[[2009,6,23]]},"location":"Seoul","end":{"date-parts":[[2009,6,27]]}},"container-title":["2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5286911\/5291544\/05291575.pdf?arnumber=5291575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T02:57:20Z","timestamp":1497841040000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5291575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2009.5291575","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}