{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:56Z","timestamp":1750220696783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T00:00:00Z","timestamp":1579564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,21]]},"DOI":"10.1145\/3375246.3375255","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T19:59:48Z","timestamp":1604087988000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Heuristic-aided symbolic simulation for trickle-based wireless sensors networks configuration"],"prefix":"10.1145","author":[{"given":"Boutheina","family":"Bannour","sequence":"first","affiliation":[{"name":"CEA, LIST"}]},{"given":"Arnault","family":"Lapitre","sequence":"additional","affiliation":[{"name":"CEA, LIST"}]}],"member":"320","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Re-Emerging Mirai-like Botnets Are Threatening IoT Security in 2019. http:\/\/www.iotforall.com\/mirai-botnets-threatening-iot-security-2019\/.  Re-Emerging Mirai-like Botnets Are Threatening IoT Security in 2019. http:\/\/www.iotforall.com\/mirai-botnets-threatening-iot-security-2019\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Ipv6 routing protocol for low-power and lossy networks, request for comments: 6550. Technical report","author":"RPL","year":"2012","unstructured":"RPL : Ipv6 routing protocol for low-power and lossy networks, request for comments: 6550. Technical report , Cooper Power Systems and Cisco Systems and Stanford University , March 2012 . RPL: Ipv6 routing protocol for low-power and lossy networks, request for comments: 6550. Technical report, Cooper Power Systems and Cisco Systems and Stanford University, March 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646217.681857"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"volume-title":"Modelling and simulating the trickle algorithm","author":"Becker M.","key":"e_1_3_2_1_5_1","unstructured":"M. Becker , K. Kuladinithi , and C. G\u00f6rg . Modelling and simulating the trickle algorithm . In MONAMI. Springer . M. Becker, K. Kuladinithi, and C. G\u00f6rg. Modelling and simulating the trickle algorithm. In MONAMI. Springer."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/322374.322380"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343618"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_1_9_1","volume-title":"Silicon Labs","author":"Hui J.","year":"2016","unstructured":"J. Hui and R. Kelsey . Multicast protocol for low-power and lossy networks, request for comments: 7731. Technical report , Silicon Labs , February 2016 . J. Hui and R. Kelsey. Multicast protocol for low-power and lossy networks, request for comments: 7731. Technical report, Silicon Labs, February 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.111612.121232"},{"key":"e_1_3_2_1_12_1","volume-title":"March","author":"Levis P.","year":"2011","unstructured":"P. Levis , T. Clausen , J. Hui , O. Gnawali , and J. Ko . The trickle algorithm, request for comments: 6206. Technical report , March 2011 . P. Levis, T. Clausen, J. Hui, O. Gnawali, and J. Ko. The trickle algorithm, request for comments: 6206. Technical report, March 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251175.1251177"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2016.01.003"},{"volume-title":"An analytic evaluation of the trickle algorithm: Towards efficient, fair, fast and reliable data dissemination","author":"Meyfroyt T. M. M.","key":"e_1_3_2_1_16_1","unstructured":"T. M. M. Meyfroyt . An analytic evaluation of the trickle algorithm: Towards efficient, fair, fast and reliable data dissemination . In WoWMoM. IEEE. T. M. M. Meyfroyt. An analytic evaluation of the trickle algorithm: Towards efficient, fair, fast and reliable data dissemination. In WoWMoM. IEEE."},{"key":"e_1_3_2_1_17_1","volume-title":"VVIoT@ICST","author":"Nguyen N. M. T.","year":"2019","unstructured":"N. M. T. Nguyen , B. Bannour , A. Lapitre , and P. Le Gall . Behavioral models and scenario selection for testing iot trickle-based lossy multi-cast networks . In VVIoT@ICST . IEEE , 2019 . N. M. T. Nguyen, B. Bannour, A. Lapitre, and P. Le Gall. Behavioral models and scenario selection for testing iot trickle-based lossy multi-cast networks. In VVIoT@ICST. IEEE, 2019."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3228332"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218776.1218786"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885174.1885193"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2650318"}],"event":{"name":"RAPIDO '20: Methods and Tools","acronym":"RAPIDO '20","location":"Bologna Italy"},"container-title":["Proceedings of the Conference on Rapid Simulation and Performance Evaluation: Methods and Tools"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375246.3375255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375246.3375255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:48Z","timestamp":1750199568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375246.3375255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,21]]},"references-count":21,"alternative-id":["10.1145\/3375246.3375255","10.1145\/3375246"],"URL":"https:\/\/doi.org\/10.1145\/3375246.3375255","relation":{},"subject":[],"published":{"date-parts":[[2020,1,21]]},"assertion":[{"value":"2020-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}