{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:18Z","timestamp":1761401898675,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/wowmom.2017.7974301","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T16:47:46Z","timestamp":1499964466000},"page":"1-3","source":"Crossref","is-referenced-by-count":5,"title":["On modeling of eavesdropping behavior in underwater acoustic sensor networks"],"prefix":"10.1109","author":[{"given":"Qiu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Modeling the wormhole attack in underwater sensor network","author":"lu","year":"2012","journal-title":"Proceedings of the 12th International Conference on Wireless Communications Networking and Mobile Computing IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s16050721"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/0470118474"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2377239"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-20508-0"},{"key":"ref7","first-page":"4733","article-title":"MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom","author":"he","year":"2013","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5714022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1161039.1161049"},{"key":"ref1","first-page":"257","volume":"3","author":"akyildiz","year":"2005","journal-title":"Underwater Acoustic Sensor Networks Research Challenges"}],"event":{"name":"2017 IEEE 18th International Symposium on \" World of Wireless, Mobile and Multimedia Networks (WoWMoM)","start":{"date-parts":[[2017,6,12]]},"location":"Macau, China","end":{"date-parts":[[2017,6,15]]}},"container-title":["2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7965808\/7974270\/07974301.pdf?arnumber=7974301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:48:30Z","timestamp":1502884110000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7974301\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2017.7974301","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}