{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:29Z","timestamp":1763467709013,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,2]],"date-time":"2005-09-02T00:00:00Z","timestamp":1125619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,2]]},"DOI":"10.1145\/1080793.1080801","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["A framework for MAC protocol misbehavior detection in wireless networks"],"prefix":"10.1145","author":[{"given":"Svetlana","family":"Radosavac","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John S.","family":"Baras","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Iordanis","family":"Koutsopoulos","sequence":"additional","affiliation":[{"name":"University of Thessaly, Volos, Greece"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2005,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of USENIX Security Symposium","author":"Bellardo J.","year":"2003","unstructured":"J. Bellardo and S. Savage . 802.11 denial-of-service attacks: real vulnerabilities and practical solutions . In Proc. of USENIX Security Symposium , San Antonio, TX , June 2003 . J. Bellardo and S. Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proc. of USENIX Security Symposium, San Antonio, TX, June 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"Convex analysis and optimization. Athena Scienti?c","author":"Bertsekas D.","year":"2003","unstructured":"D. Bertsekas . Convex analysis and optimization. Athena Scienti?c , 2003 . D. Bertsekas. Convex analysis and optimization. Athena Scienti?c, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/513800.513828"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1029102.1029107"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/18.796383"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MILCOM.2002.1179634"},{"key":"e_1_3_2_1_8_1","volume-title":"Elements of signal detection and estimation","author":"Helstrom C. W.","year":"1995","unstructured":"C. W. Helstrom . Elements of signal detection and estimation . Prentice-Hall , 1995 . C. W. Helstrom. Elements of signal detection and estimation. Prentice-Hall, 1995."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE wireless LAN medium access control(MAC) and physical layer(PHY) speci?cations","author":"IEEE.","year":"1999","unstructured":"IEEE. IEEE wireless LAN medium access control(MAC) and physical layer(PHY) speci?cations , 1999 . IEEE. IEEE wireless LAN medium access control(MAC) and physical layer(PHY) speci?cations, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/PROC.1985.13167"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of International Conference on Dependable Systems and Networks","author":"Vaidya P. Kyasanurand N.","year":"2003","unstructured":"P. Kyasanurand N. Vaidya . Detection and handling of MAC layer misbehavior in wireless networks . In Proc. of International Conference on Dependable Systems and Networks , 2003 . P. Kyasanurand N. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. In Proc. of International Conference on Dependable Systems and Networks, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/345910.345955"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/990064.990077"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TIT.1984.1056876"},{"key":"e_1_3_2_1_15_1","volume-title":"Sequential Analysis","author":"Wald A.","year":"1947","unstructured":"A. Wald . Sequential Analysis . John Wiley and Sons , New York , 1947 . A. Wald. Sequential Analysis. John Wiley and Sons, New York, 1947."}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"acronym":"WiSE05","name":"WiSE05: 2005 ACM Workshop on Wireless Security ( co-located with Mobicom 2005 Conference )","location":"Cologne Germany"},"container-title":["Proceedings of the 4th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080801","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080793.1080801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:42Z","timestamp":1750263522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080801"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,2]]},"references-count":14,"alternative-id":["10.1145\/1080793.1080801","10.1145\/1080793"],"URL":"https:\/\/doi.org\/10.1145\/1080793.1080801","relation":{},"subject":[],"published":{"date-parts":[[2005,9,2]]},"assertion":[{"value":"2005-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}