{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:31Z","timestamp":1750221271162,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":13,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3151848.3151863","type":"proceedings-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T13:26:49Z","timestamp":1516714009000},"page":"182-190","source":"Crossref","is-referenced-by-count":3,"title":["WSN-based Border Surveillance Systems Using Estimated Known Crossing Paths"],"prefix":"10.1145","author":[{"given":"Imen","family":"Arfaoui","sequence":"first","affiliation":[{"name":"CNAS Research lab, University of Carthage, Tunisia"}]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[{"name":"CNAS Research lab, University of Carthage, Tunisia"}]},{"given":"Khalifa","family":"Trimeche","sequence":"additional","affiliation":[{"name":"University of Tunis El manar, Tunisia"}]},{"given":"Walid","family":"Abdallah","sequence":"additional","affiliation":[{"name":"CNAS Research lab, University of Carthage, Tunisia"}]}],"member":"320","reference":[{"key":"key-10.1145\/3151848.3151863-1","doi-asserted-by":"crossref","unstructured":"M. H. Alkhathami. Overview of border control using wireless sensor network. International Journal of Scientific & Engineering Research, 6(3), 2015.","DOI":"10.14299\/ijser.2015.03.009"},{"key":"key-10.1145\/3151848.3151863-2","doi-asserted-by":"crossref","unstructured":"R. Bellazreg, N. Boudriga, and S. An. Border surveillance using sensor based thick-lines. In International Conference on Information Networking, pages 221--226, Bangkok, January 2013.","DOI":"10.1109\/ICOIN.2013.6496380"},{"key":"key-10.1145\/3151848.3151863-3","unstructured":"M. Brazil, C.J. Ras, and D.A. Thomas. Deterministic deployment of wireless sensor networks. World Congress on Engineering, 1, 2009."},{"key":"key-10.1145\/3151848.3151863-4","doi-asserted-by":"crossref","unstructured":"I. Butun, In-Ho Ra, and R. Sankar. An intrusion detection system based on multi-level clustering for hierarchicalwireless sensor networks. Sensors, 15:28960--28978, 2015.","DOI":"10.3390\/s151128960"},{"key":"key-10.1145\/3151848.3151863-5","doi-asserted-by":"crossref","unstructured":"M. Chitnis, Y. Liang, J.Y. Zheng, P. Pagano, and G. Lipari. Wireless line sensor network for distributed visual surveillance. In ACM Symposium on Performance Evaluation of Wireless ad Hoc, Sensor, and Ubiquitous Networks, Tenerife, October 2009.","DOI":"10.1145\/1641876.1641890"},{"key":"key-10.1145\/3151848.3151863-6","doi-asserted-by":"crossref","unstructured":"A. Ez-Zaidi and S. Rakrak. A comparative study of target tracking approaches in wireless sensor networks. Sensors, 2016:11 pages, 2016.","DOI":"10.1155\/2016\/3270659"},{"key":"key-10.1145\/3151848.3151863-7","doi-asserted-by":"crossref","unstructured":"J. Li, L. L.H. Andrew, Ch. Heng Foh, M. Zukerman, and H-H. Chen. Connectivity, coverage and placement in wireless sensor networks. Sensors, 9:7664--7693, 2009.","DOI":"10.3390\/s91007664"},{"key":"key-10.1145\/3151848.3151863-8","doi-asserted-by":"crossref","unstructured":"B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley. Mobility improves coverage of sensor networks. In Proceedings of the ACM MobiHoc Conference, pages 300--308, 2005.","DOI":"10.1145\/1062689.1062728"},{"key":"key-10.1145\/3151848.3151863-9","unstructured":"M. J. Abdel Rahman, D. Abu-Aysheh, A. I. Abu-El-Hajja, R. J. Abu-Aysheh, and H. M. Al-Najjar. Detecting intruders by wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2016:1--39, 2016."},{"key":"key-10.1145\/3151848.3151863-10","doi-asserted-by":"crossref","unstructured":"Z. Suna, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-Dhelaan, and I. F. Akyildiz. Bordersense: Border patrol through advanced wireless sensor networks. Ad Hoc Networks, 9(3):468--477, 2011.","DOI":"10.1016\/j.adhoc.2010.09.008"},{"key":"key-10.1145\/3151848.3151863-11","doi-asserted-by":"crossref","unstructured":"T. Wang, Z. Peng, J. Liang, Sh. Wen, Md. A. Bhuiyan, Y. Cai, and J. Cao. Following targets for mobile tracking in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 12(4), 2016.","DOI":"10.1145\/2968450"},{"key":"key-10.1145\/3151848.3151863-12","doi-asserted-by":"crossref","unstructured":"Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7(8):698--711, 2008.","DOI":"10.1109\/TMC.2008.19"},{"key":"key-10.1145\/3151848.3151863-13","doi-asserted-by":"crossref","unstructured":"Y. Wen, R. Gao, and H. Zhao. Energy efficient moving target tracking in wireless sensor networks. Sensors, 16(1), 2016.","DOI":"10.3390\/s16010029"}],"event":{"number":"15","sponsor":["@WAS, International Organization of Information Integration and Web-based Applications and Services","Johannes Kepler University, Linz, Austria"],"acronym":"MoMM2017","name":"the 15th International Conference","start":{"date-parts":[[2017,12,4]]},"location":"Salzburg, Austria","end":{"date-parts":[[2017,12,6]]}},"container-title":["Proceedings of the 15th International Conference on Advances in Mobile Computing &amp; Multimedia - MoMM2017"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3151848.3151863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3151863&ftid=1942071&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:06Z","timestamp":1750212666000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3151848.3151863"}},"subtitle":[],"proceedings-subject":"Advances in Mobile Computing & Multimedia","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1145\/3151848.3151863","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}