{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:06:06Z","timestamp":1767337566840,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1D1A1B02011964"],"award-info":[{"award-number":["2016R1D1A1B02011964"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,11]]},"DOI":"10.1145\/2987386.2987397","type":"proceedings-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T14:02:02Z","timestamp":1479736922000},"page":"125-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection System based on Complex Event Processing in RFID middleware"],"prefix":"10.1145","author":[{"given":"Shang-Nan","family":"Yin","sequence":"first","affiliation":[{"name":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"}]},{"given":"Ho-Seok","family":"Kang","sequence":"additional","affiliation":[{"name":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"}]},{"given":"Zhi-Guo","family":"Chen","sequence":"additional","affiliation":[{"name":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"}]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[{"name":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"}]}],"member":"320","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"15","volume-title":"RFID","author":"Garfinkel S.","year":"2006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2008.02481"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.168"},{"issue":"7","key":"e_1_3_2_1_4_1","first-page":"89","article-title":"Deckard: A system to detect change of rfid tag ownership","volume":"7","author":"Mirowski L.","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALPIT.2008.51"},{"key":"e_1_3_2_1_6_1","first-page":"54","volume-title":"Auto-ID labs research workshop","author":"Ranasinghe D.","year":"2004"},{"volume-title":"Auto-ID Center","year":"2001","author":"Sarma S.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"3","volume-title":"ISO Bulletin","author":"Schuermann J.","year":"2000"},{"issue":"8","key":"e_1_3_2_1_9_1","first-page":"2623","article-title":"Rfid intrusion detection with possibilistic fuzzy c-means clustering","volume":"6","author":"H. YANG, C.","year":"2010","journal-title":"Journal of Computational Information Systems"}],"event":{"name":"RACS '16: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Odense Denmark","acronym":"RACS '16"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987386.2987397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:37Z","timestamp":1750282717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":9,"alternative-id":["10.1145\/2987386.2987397","10.1145\/2987386"],"URL":"https:\/\/doi.org\/10.1145\/2987386.2987397","relation":{},"subject":[],"published":{"date-parts":[[2016,10,11]]},"assertion":[{"value":"2016-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}