{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:15Z","timestamp":1750309215495,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-05-1-0270W911NF-07-1-0318"],"award-info":[{"award-number":["W911NF-05-1-0270W911NF-07-1-0318"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CAREER-0643906"],"award-info":[{"award-number":["CAREER-0643906"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460909","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A cross-layer dropping attack in video streaming over ad hoc networks"],"prefix":"10.1145","author":[{"given":"Min","family":"Shao","sequence":"first","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Tom","family":"La Porta","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Prasant","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"University of California at Davis"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"unstructured":"Glomosim http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/.  Glomosim http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"http:\/\/trace.eas.asu.edu\/tracemain.html.  http:\/\/trace.eas.asu.edu\/tracemain.html.","key":"e_1_3_2_1_2_1"},{"unstructured":"http:\/\/trace.eas.asu.edu\/trace\/pics\/frametrace\/mp4\/verbose _firstcontact.dat.  http:\/\/trace.eas.asu.edu\/trace\/pics\/frametrace\/mp4\/verbose _firstcontact.dat.","key":"e_1_3_2_1_3_1"},{"unstructured":"http:\/\/www.mpeg.org\/.  http:\/\/www.mpeg.org\/.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/TPDS.2007.1021"},{"key":"e_1_3_2_1_6_1","first-page":"3611","article-title":"control protocol extended reports (rtcp xr)","year":"2003","unstructured":"Rtp control protocol extended reports (rtcp xr) , Internet RFC 3611 , 2003 . Rtp control protocol extended reports (rtcp xr), Internet RFC 3611, 2003.","journal-title":"Internet RFC"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1023720.1023741"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_9_1","volume-title":"P2PEcon","author":"Buchegger S.","year":"2004","unstructured":"S. Buchegger and J.-Y. Le Boudec . A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks . In P2PEcon 2004 . S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.comcom.2007.02.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/PERCOM.2005.53"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/s11042-006-0086-3"},{"volume-title":"WMCSA '02","author":"Hu Y.-C.","unstructured":"Y.-C. Hu , D. B. Johnson , and A. Perrig . Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks . In WMCSA '02 . Y.-C. Hu, D. B. Johnson, and A. Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In WMCSA '02.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/MSP.2004.1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/s11276-004-4744-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE International Symposium on Circuits and Systems, 1: 57--60","author":"Lin S.","year":"2002","unstructured":"S. Lin , Y. Wang , S. Mao , and S. Panwar . Video transport over ad-hoc networks using multiple paths . IEEE International Symposium on Circuits and Systems, 1: 57--60 , 2002 . S. Lin, Y. Wang, S. Mao, and S. Panwar. Video transport over ad-hoc networks using multiple paths. IEEE International Symposium on Circuits and Systems, 1:57--60, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/938985.939021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_20_1","first-page":"3550","article-title":"Rtp: A transport protocol for real-time applications","author":"Schulzrinne H.","year":"2003","unstructured":"H. Schulzrinne , S. Casner , R. Frederick , and V. Jacobson . Rtp: A transport protocol for real-time applications , Internet RFC 3550 , 2003 . H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. Rtp: A transport protocol for real-time applications, Internet RFC 3550, 2003.","journal-title":"Internet RFC"},{"key":"e_1_3_2_1_21_1","first-page":"2326","article-title":"Real time streaming protocol (rtsp)","author":"Schulzrinne H.","year":"1998","unstructured":"H. Schulzrinne , A. Rao , and R. Lanphier . Real time streaming protocol (rtsp) , Internet RFC 2326 , 1998 . H. Schulzrinne, A. Rao, and R. Lanphier. Real time streaming protocol (rtsp), Internet RFC 2326, 1998.","journal-title":"Internet RFC"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/MWC.2005.1497859"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1062689.1062697"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/570681.570683"}],"event":{"sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"Securecomm08","name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","location":"Istanbul Turkey"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":24,"alternative-id":["10.1145\/1460877.1460909","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460909","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}