{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:14Z","timestamp":1750306874748,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381755","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"204-209","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Periodic route selection for secure packet delivery"],"prefix":"10.1145","author":[{"family":"Suman","sequence":"first","affiliation":[{"name":"Deenbandhu Chhotu Ram University of Sc. &amp; Tech., Murthal, Sonipat, Haryana (India)"}]},{"given":"Parvinder","family":"Singh","sequence":"additional","affiliation":[{"name":"Deenbandhu Chhotu Ram University of Sc. &amp; Tech., Murthal, Sonipat, Haryana (India)"}]},{"given":"R. B.","family":"Patel","sequence":"additional","affiliation":[{"name":"Deenbandhu Chhotu Ram University of Sc. &amp; Tech., Murthal, Sonipat, Haryana (India)"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/336460.336478"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/GLOCOMW.2007.4437813"},{"key":"e_1_3_2_1_3_1","volume-title":"Elesevier Journal of Fuzzy sets and systems","author":"Mikut R.","year":"2004","unstructured":"R. Mikut , J. Jakel , L. Groll . 2004. Interpretability issues in data based learning of fuzzy systems . In Elesevier Journal of Fuzzy sets and systems , July 2004 . R. Mikut, J. Jakel, L. Groll. 2004. Interpretability issues in data based learning of fuzzy systems. In Elesevier Journal of Fuzzy sets and systems, July 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"Journal of human factors and ergonomics society","author":"Dorsey D. W.","year":"2003","unstructured":"D. W. Dorsey , M. D. Coovert . 2003. Mathematical Modelling on decision making: a soft and fuzzy approach to computing hard decisions . In Journal of human factors and ergonomics society , Vol. 45 , issue 1(spring 2003 ), 117--135. D. W. Dorsey, M. D. Coovert. 2003. Mathematical Modelling on decision making: a soft and fuzzy approach to computing hard decisions. In Journal of human factors and ergonomics society, Vol. 45, issue 1(spring 2003), 117--135."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1504\/IJSN.2006.010825"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TMC.2006.116"},{"key":"e_1_3_2_1_7_1","volume-title":"ITTC All-Hands Meeting, presentation","author":"Bali S.","year":"2006","unstructured":"S. Bali . 2006 . Mitigating scheduler-induced starvation in 5g wireless networks . ITTC All-Hands Meeting, presentation , November 2006. S. Bali. 2006. Mitigating scheduler-induced starvation in 5g wireless networks. ITTC All-Hands Meeting, presentation, November 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1161089.1161111"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1102120.1102171"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of 7th Annual International Working Conference on Active and Programmable Networks (IWAN 2005","author":"Xie L.","year":"2005","unstructured":"L. Xie , P. Smith , M. Banfield , H. Leopold , J. Sterbenz , D. Hutchison . 2005 . Towards resilient networks using programmable networking technologies . In Proceedings of 7th Annual International Working Conference on Active and Programmable Networks (IWAN 2005 ). (Sophia Antipolis, France , November 2005). L. Xie, P. Smith, M. Banfield, H. Leopold, J. Sterbenz, D. Hutchison. 2005. Towards resilient networks using programmable networking technologies. In Proceedings of 7th Annual International Working Conference on Active and Programmable Networks (IWAN 2005). (Sophia Antipolis, France, November 2005)."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of IEEE International Conference on Information Science and Applications. (Korea,2011)","author":"Yim H.","year":"2011","unstructured":"H. Yim , T. Kim , J. Jung . 2011 . Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source . In Proceedings of IEEE International Conference on Information Science and Applications. (Korea,2011) , 706--713. H. Yim, T. Kim, J. Jung. 2011. Probabilistic Route Selection Algorithm to Trace DDoS Attack Traffic Source. In Proceedings of IEEE International Conference on Information Science and Applications. (Korea,2011), 706--713."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.5555\/1834217.1834473"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ISMS.2011.59"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1143549.1143602"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/WOWMOM.2009.5282474"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of IEEE Military Communications Conference (MILCOM)","author":"Sterbenz Justin P.","year":"2007","unstructured":"Rohrer, Justin P. Sterbenz , James P. G. Wang , Weichao. 2007 . Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol . In Proceedings of IEEE Military Communications Conference (MILCOM) , (2007), 1--6. Rohrer, Justin P. Sterbenz, James P. G. Wang, Weichao. 2007. Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol. In Proceedings of IEEE Military Communications Conference (MILCOM), (2007), 1--6."},{"key":"e_1_3_2_1_18_1","volume-title":"Iin Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC 2006","volume":"2","author":"Srinivasan Bin","year":"2006","unstructured":"18 . Bin Xie; Srinivasan , A. K. S.; Agrawal , D. P. 2006 . GMSP: a generalized multi-hop security protocol for heterogeneous multi-hop wireless network . Iin Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC 2006 ), vol. 2 , no. 3,.(2006), 634--639 18. Bin Xie; Srinivasan, A. K. S.; Agrawal, D. P. 2006. GMSP: a generalized multi-hop security protocol for heterogeneous multi-hop wireless network. Iin Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC 2006), vol. 2, no. 3,.(2006), 634--639"}],"event":{"sponsor":["CUOT Curtin University of Technology"],"acronym":"CUBE '12","name":"CUBE '12: CUBE International IT Conference & Exhibition","location":"Pune India"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:22Z","timestamp":1750234702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":17,"alternative-id":["10.1145\/2381716.2381755","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381755","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}