{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:19Z","timestamp":1750306879749,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T00:00:00Z","timestamp":1358380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["11-07-00183-a"],"award-info":[{"award-number":["11-07-00183-a"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002994","name":"Ministry of Knowledge Economy","doi-asserted-by":"publisher","award":["ITRC NIPA-2011-(C1090-1121-0008), WCU(R31-2010-000-10062-0), PRCP(2011-0018397)"],"award-info":[{"award-number":["ITRC NIPA-2011-(C1090-1121-0008), WCU(R31-2010-000-10062-0), PRCP(2011-0018397)"]}],"id":[{"id":"10.13039\/501100002994","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["ITRC NIPA-2011-(C1090-1121-0008), WCU(R31-2010-000-10062-0), PRCP(2011-0018397)"],"award-info":[{"award-number":["ITRC NIPA-2011-(C1090-1121-0008), WCU(R31-2010-000-10062-0), PRCP(2011-0018397)"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,17]]},"DOI":"10.1145\/2448556.2448605","type":"proceedings-article","created":{"date-parts":[[2013,3,19]],"date-time":"2013-03-19T13:34:53Z","timestamp":1363700093000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Flooding attack in energy harvesting wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Vladimir","family":"Shakhov","sequence":"first","affiliation":[{"name":"Informatics Systems Section, ICMMG SB RAS, Novosibirsk, Russia"}]},{"given":"Sangyep","family":"Nam","sequence":"additional","affiliation":[{"name":"Kookje College, Gyeonggi, Korea"}]},{"given":"Hyunseung","family":"Choo","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098926"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381692"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.913828"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2011.04.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02347551"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2003.1213626"},{"key":"e_1_3_2_1_8_1","volume-title":"Editor","author":"Cannon C. R.","year":"2007","unstructured":"P. S. Cannon and C. R. Harding , \" Future military wireless solutions,\" Ch. 8 in Wireless Communications: The Future , Editor William Webb, John Wiley & Sons , 2007 . P. S. Cannon and C. R. Harding, \"Future military wireless solutions,\" Ch. 8 in Wireless Communications: The Future, Editor William Webb, John Wiley & Sons, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.26636\/jtit.2008.2.870","article-title":"Theoretical and practical aspects of military wireless sensor networks","volume":"2","author":"Winkler K.-D.","year":"2008","unstructured":"M. Winkler , K.-D. Tuchs , K. Hughes , and G. Barclay , Theoretical and practical aspects of military wireless sensor networks , Journal of Telecommunications and Information Technology , 2 ( 2008 ), 37 -- 45 . M. Winkler, K.-D. Tuchs, K. Hughes, and G. Barclay, Theoretical and practical aspects of military wireless sensor networks, Journal of Telecommunications and Information Technology, 2 (2008), 37--45.","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. Performance Metrics for Intelligent Systems Workshop (PerMIS'06)","author":"Steves ASSIST","year":"2006","unstructured":"M. P. Steves , \"Utility Assessments of Soldier-Wom Sensor Systems for ASSIST ,\" in Proc. Performance Metrics for Intelligent Systems Workshop (PerMIS'06) , Gaithersburg, MD , Aug. 2006 . M. P. Steves, \"Utility Assessments of Soldier-Wom Sensor Systems for ASSIST,\" in Proc. Performance Metrics for Intelligent Systems Workshop (PerMIS'06), Gaithersburg, MD, Aug. 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1269130"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5424\/sjar\/2009074-1092"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.1131"},{"key":"e_1_3_2_1_14_1","first-page":"3780","article-title":"Yang, A fire detecting method based on multi-sensor data fusion, in: Proc. IEEE Int. Conf. on Systems","volume":"3775","author":"Chen H.","year":"2003","unstructured":"S. Chen , H. Bao , X. Zeng , Y . Yang, A fire detecting method based on multi-sensor data fusion, in: Proc. IEEE Int. Conf. on Systems , Man and Cybernetics , 2003 , 3775 -- 3780 . S. Chen, H. Bao, X. Zeng, Y. Yang, A fire detecting method based on multi-sensor data fusion, in: Proc. IEEE Int. Conf. on Systems, Man and Cybernetics, 2003, 3775--3780.","journal-title":"Man and Cybernetics"},{"key":"e_1_3_2_1_15_1","first-page":"28","volume-title":"Proceedings of the International Conference on Wireless Networks and Systems","author":"Bernardo R.","year":"2007","unstructured":"L. Bernardo , R. Oliveira , R. Tiago , P. Pinto , A fire monitoring application for scattered wireless sensor networks: A peer-to-peer cross-layering approach , in: Proceedings of the International Conference on Wireless Networks and Systems , Barcelona, Spain , 2007 , pp. 28 -- 31 . L. Bernardo, R. Oliveira, R. Tiago, P. Pinto, A fire monitoring application for scattered wireless sensor networks: A peer-to-peer cross-layering approach, in: Proceedings of the International Conference on Wireless Networks and Systems, Barcelona, Spain, 2007, pp. 28--31."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2010.09.094"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6311320"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599219"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5505973"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1004-4132.2011.02.022"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1143254"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2185831"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON.2008.4602623"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.30"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0088(20001130)20:14<1843::AID-JOC561>3.0.CO;2-O"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207160304675"}],"event":{"name":"ICUIMC '13: The 7th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Kota Kinabalu Malaysia","acronym":"ICUIMC '13"},"container-title":["Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2448556.2448605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:31Z","timestamp":1750234711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,17]]},"references-count":30,"alternative-id":["10.1145\/2448556.2448605","10.1145\/2448556"],"URL":"https:\/\/doi.org\/10.1145\/2448556.2448605","relation":{},"subject":[],"published":{"date-parts":[[2013,1,17]]},"assertion":[{"value":"2013-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}