{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:26Z","timestamp":1750221086206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T00:00:00Z","timestamp":1529625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,22]]},"DOI":"10.1145\/3234664.3234672","type":"proceedings-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T12:17:05Z","timestamp":1540297025000},"page":"43-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Measuring Sensor to Cloud Energy Consumption"],"prefix":"10.1145","author":[{"given":"Abdul Fuad Abdul","family":"Rahman","sequence":"first","affiliation":[{"name":"Universiti Sains Islam Malaysia, Nilai, Malaysia"}]},{"given":"Azni Ab","family":"Halim","sequence":"additional","affiliation":[{"name":"Universiti Sains Islam Malaysia, Nilai, Malaysia"}]},{"given":"Najwa Hayaati Mohd","family":"Alwi","sequence":"additional","affiliation":[{"name":"Universiti Sains Islam Malaysia, Nilai, Malaysia"}]},{"given":"Kamaruzzaman Seman","family":"Alwi","sequence":"additional","affiliation":[{"name":"Universiti Sains Islam Malaysia, Nilai, Malaysia"}]},{"given":"Farhan Arif","family":"Mohamad","sequence":"additional","affiliation":[{"name":"IoT Security Lab, CyberSecurity Malaysia, Cyberjaya, Malaysia"}]},{"given":"Mohamad Nasrul","family":"Taufiq","sequence":"additional","affiliation":[{"name":"IoT Security Lab, CyberSecurity Malaysia, Cyberjaya, Malaysia"}]},{"given":"Madihah Zulfa","family":"Mohamad","sequence":"additional","affiliation":[{"name":"MyCyberClinic, CyberSecurity Malaysia, Cyberjaya, Malaysia"}]},{"given":"Khairul Azri Zainal","family":"Abidin","sequence":"additional","affiliation":[{"name":"IoT Security Lab, CyberSecurity Malaysia, Cyberjaya, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2018,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.25518\/0037-9565.5440"},{"issue":"3","key":"e_1_3_2_1_2_1","article-title":"Forensic Readiness Secure Network Architecture for WBAN","volume":"8","author":"Rahman A.F.A","year":"2014","unstructured":"Rahman A.F.A , Ahmad R. Mohamad M.Z. , Developing \" Forensic Readiness Secure Network Architecture for WBAN \", International Journal of Security and Its Application , Vol 8 , No. 3 , 2014 Rahman A.F.A, Ahmad R. Mohamad M.Z., Developing \"Forensic Readiness Secure Network Architecture for WBAN\", International Journal of Security and Its Application, Vol 8, No. 3, 2014","journal-title":"International Journal of Security and Its Application"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118993620.ch7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/ICACT.2014.6778944","volume-title":"Forensics Readiness for Wireless Body Area Network System\", the 16th International Conference of Advanced Communication Technology (ICACT","author":"Rahman A.F.A.","year":"2014","unstructured":"Rahman A.F.A. , Ahmad R. and Ramli S.N. , \" Forensics Readiness for Wireless Body Area Network System\", the 16th International Conference of Advanced Communication Technology (ICACT 2014 ), ISSN : 17389445, pp 177 -- 180 , 2014. Rahman A.F.A., Ahmad R. and Ramli S.N., \"Forensics Readiness for Wireless Body Area Network System\", the 16th International Conference of Advanced Communication Technology (ICACT 2014), ISSN: 17389445, pp 177--180, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"e_1_3_2_1_6_1","article-title":"Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices","author":"Stemm M","year":"1993","unstructured":"Stemm M and Katz H , \" Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices \", Journal of Computing Systems , 1993 Stemm M and Katz H, \"Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices\", Journal of Computing Systems, 1993","journal-title":"Journal of Computing Systems"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-156"},{"issue":"4","key":"e_1_3_2_1_8_1","article-title":"Distance Based Energy Efficient Selection of Nodes To Cluster Head In Homogeneous Wireless Sensor Networks","volume":"4","author":"Taruna S.","year":"2012","unstructured":"Taruna S. , Kohli S. , and Purohit G.N ., \" Distance Based Energy Efficient Selection of Nodes To Cluster Head In Homogeneous Wireless Sensor Networks \", International Journal of Wireless &amp; Mobile Networks (IJWMN) Vol. 4 , No. 4 , 2012 Taruna S., Kohli S., and Purohit G.N., \"Distance Based Energy Efficient Selection of Nodes To Cluster Head In Homogeneous Wireless Sensor Networks\", International Journal of Wireless &amp; Mobile Networks (IJWMN) Vol. 4, No. 4, 2012","journal-title":"International Journal of Wireless &amp; Mobile Networks (IJWMN)"},{"key":"e_1_3_2_1_9_1","article-title":"B, \"Analyzing The Energy Consumption Of Ieee 802.11 Ad Hoc Networks","author":"Cunha O. D","year":"2004","unstructured":"Cunha O. D , Henrique L. , Costa M.K. , and Duarte O.C.M. B, \"Analyzing The Energy Consumption Of Ieee 802.11 Ad Hoc Networks \", Journal of Mobile and Wireless Communication Networks the series IFIP International Federation for Information Processing, pp 473--484 , 2004 Cunha O. D, Henrique L., Costa M.K., and Duarte O.C.M.B, \"Analyzing The Energy Consumption Of Ieee 802.11 Ad Hoc Networks\", Journal of Mobile and Wireless Communication Networks the series IFIP International Federation for Information Processing, pp 473--484, 2004","journal-title":"Journal of Mobile and Wireless Communication Networks the series IFIP International Federation for Information Processing, pp 473--484"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2015.V3.152"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2906198"}],"event":{"name":"HPCCT 2018: 2018 2nd High Performance Computing and Cluster Technologies Conference","sponsor":["Shanghai Jiao Tong University Shanghai Jiao Tong University","Xi'an Jiaotong-Liverpool University Xi'an Jiaotong-Liverpool University","Chinese Academy of Sciences"],"location":"Beijing China","acronym":"HPCCT 2018"},"container-title":["Proceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234664.3234672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3234664.3234672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:48Z","timestamp":1750208268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234664.3234672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,22]]},"references-count":11,"alternative-id":["10.1145\/3234664.3234672","10.1145\/3234664"],"URL":"https:\/\/doi.org\/10.1145\/3234664.3234672","relation":{},"subject":[],"published":{"date-parts":[[2018,6,22]]},"assertion":[{"value":"2018-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}