{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:59Z","timestamp":1750306439864,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2799979.2800028","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"150-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity of ad-hoc distributed systems"],"prefix":"10.1145","author":[{"given":"Moskvin","family":"Dmitry","sequence":"first","affiliation":[{"name":"NeoBIT, LLC, St.Petersburg, Russia"}]},{"given":"Ivanov","family":"Denis","sequence":"additional","affiliation":[{"name":"NeoBIT, LLC, St.Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mishra A. and Nadkarni K. 2003. Security in wireless ad hoc networks. ACM New York NY USA \u00a92003. DOI= http:\/\/dl.acm.org\/citation.cfm?doid=964696.964697.  Mishra A. and Nadkarni K. 2003. Security in wireless ad hoc networks. ACM New York NY USA \u00a92003. DOI= http:\/\/dl.acm.org\/citation.cfm?doid=964696.964697."},{"key":"e_1_3_2_1_2_1","volume-title":"Wireless Communications and Networking Conference, 2004","author":"Yanchao Z.","year":"2004","unstructured":"Yanchao , Z. , Wenjing , L. , and Yuguang , F . 2004. SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks . Wireless Communications and Networking Conference, 2004 . WCNC. 2004 IEEE (Volume: 3 ) Yanchao, Z., Wenjing, L., and Yuguang, F. 2004. SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks. Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE (Volume: 3 )"},{"key":"e_1_3_2_1_3_1","unstructured":"Po-Wah Y. Shenglan H. and Chris M. 2007. Malicious attacks on ad hoc network routing protocols. International Journal of Computer research 15 no.1.  Po-Wah Y. Shenglan H. and Chris M. 2007. Malicious attacks on ad hoc network routing protocols. International Journal of Computer research 15 no.1."},{"key":"e_1_3_2_1_4_1","volume-title":"Inter- and Intra-Vehicle Communications","author":"Held G.","year":"2007","unstructured":"Held , G. 2007. Inter- and Intra-Vehicle Communications . Auerbach Publications 2007 Held, G. 2007. Inter- and Intra-Vehicle Communications. Auerbach Publications 2007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Johnson D. Hu Y. and Maltz D. 2007. The Dynamic Source Routing Protocol (DSR) for Mobile Ad-Hoc Networks for IPv4 (RFC 4728).  Johnson D. Hu Y. and Maltz D. 2007. The Dynamic Source Routing Protocol (DSR) for Mobile Ad-Hoc Networks for IPv4 (RFC 4728).","DOI":"10.17487\/rfc4728"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Perkins C. and Belding-Royer E. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561).   Perkins C. and Belding-Royer E. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561).","DOI":"10.17487\/rfc3561"}],"event":{"name":"SIN '15: The 8th International Conference on Security of Information and Networks","acronym":"SIN '15","location":"Sochi Russia"},"container-title":["Proceedings of the 8th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2799979.2800028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:43Z","timestamp":1750225363000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":6,"alternative-id":["10.1145\/2799979.2800028","10.1145\/2799979"],"URL":"https:\/\/doi.org\/10.1145\/2799979.2800028","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}