{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T23:11:11Z","timestamp":1648595471149},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T00:00:00Z","timestamp":1310515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1687-1499-2011-39","type":"journal-article","created":{"date-parts":[[2011,7,30]],"date-time":"2011-07-30T03:19:07Z","timestamp":1311995947000},"source":"Crossref","is-referenced-by-count":1,"title":["Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks"],"prefix":"10.1186","volume":"2011","author":[{"given":"Slim","family":"Rekhis","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,13]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2005.04.002","volume":"2","author":"NicoleLang Beebe","year":"2007","unstructured":"Beebe Nicole, Clark Jan: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2007, 2: 147-165.","journal-title":"Digital Investigation"},{"issue":"2","key":"30_CR2","first-page":"1","volume":"2","author":"Peter Stephenson","year":"2003","unstructured":"Stephenson Peter: Modeling of post-incident root cause analysis. International Journal of Digital Evidence 2003, 2(2):1-16.","journal-title":"International Journal of Digital Evidence"},{"key":"30_CR3","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA","author":"Tye Stallard","year":"2003","unstructured":"Stallard Tye, Levitt Karl: Automated analysis for digital forensic science: Semantic integrity checking. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA 2003."},{"issue":"1","key":"30_CR4","first-page":"130","volume":"4","author":"Pavel Gladyshev","year":"2005","unstructured":"Gladyshev Pavel: Finite State Machine Analysis of a Blackmail Investigation. International Journal of Digital Evidence 2005, 4(1):130-149.","journal-title":"International Journal of Digital Evidence"},{"issue":"S","key":"30_CR5","first-page":"121","volume":"3","author":"D Brian","year":"2006","unstructured":"Brian D: Carrier and Eugene H. Spafford. Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation Journal 2006, 3(S):121-130.","journal-title":"Digital Investigation Journal"},{"key":"30_CR6","volume-title":"Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia","author":"SveinYngvar Willassen","year":"2008","unstructured":"Willassen Svein: Timestamp evidence correlation by model based clock hypothesis testing. Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia 2008."},{"issue":"1","key":"30_CR7","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.diin.2007.06.013","volume":"4","author":"AliReza Arasteha","year":"2007","unstructured":"Arasteha Ali, Debbabi Mourad, Sakhaa Assaad, Saleh Mohamed: Analyzing multiple logs for forensic evidence. Digital Investigation 2007, 4(1):82-91.","journal-title":"Digital Investigation"},{"key":"30_CR8","volume-title":"Computers & Security","author":"Slim Rekhis","year":"2011","unstructured":"Rekhis Slim, Boudriga Noureddine: Logic-based approach for digital forensic investigation in communication networks. Computers & Security 2011, in press."},{"issue":"14","key":"30_CR9","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1016\/j.comcom.2008.04.014","volume":"31","author":"Shuo Ding","year":"2008","unstructured":"Ding Shuo: A survey on integrating manets with the internet: Challenges and designs. Computer Communications 2008, 31(14):3537-3551. 10.1016\/j.comcom.2008.04.014","journal-title":"Computer Communications"},{"key":"30_CR10","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/SADFE.2009.16","volume-title":"Proceedings of Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, California, USA","author":"Slim Rekhis","year":"2009","unstructured":"Rekhis Slim, Boudriga Noureddine: A formal rule-based scheme for digital investigation in wireless ad-hoc networks. Proceedings of Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, California, USA 2009, 62-72."},{"key":"30_CR11","unstructured":"Gladyshev Pavel, Patel Ahmed: Formalising event time bounding in digital investigations. International Journal of Digital Evidence 2005., 4(2):"},{"key":"30_CR12","volume-title":"Proceedings of Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan","author":"Svein Willassen","year":"2008","unstructured":"Willassen Svein: Hypothesis-based investigation of digital timestamps. Proceedings of Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan 2008."},{"issue":"4","key":"30_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1504\/IJSN.2009.028670","volume":"4","author":"Slim Rekhis","year":"2009","unstructured":"Rekhis Slim, Boudriga Noureddine: Visibility: a novel concept for characterising provable network digital evidences. International journal of security and networks 2009, 4(4):234-245. 10.1504\/IJSN.2009.028670","journal-title":"International journal of security and networks"},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/IAW.2006.1652086","volume-title":"Proceedings of the 2006 IEEE Workshop on Information Assurance, West Point, NY","author":"Jill Slay","year":"2006","unstructured":"Slay Jill, Turnbull Benjamin: The need for a technical approach to digital forensic evidence collection for wireless technologies. Proceedings of the 2006 IEEE Workshop on Information Assurance, West Point, NY 2006, 124-132."},{"key":"30_CR15","volume-title":"Proceedings of The ACM Workshop on Wireless Security (WiSe 2005), Cologne, Germany","author":"Yian Huang","year":"2005","unstructured":"Huang Yi, Lee Wenke: Hotspotbased traceback for mobile ad hoc networks. Proceedings of The ACM Workshop on Wireless Security (WiSe 2005), Cologne, Germany 2005."},{"key":"30_CR16","volume-title":"The Second Annual International Conference on Mobile and Ubiquitous Systems, San Diego, USA","author":"Yongjin Kim","year":"2005","unstructured":"Kim Yongjin, Helmy Ahmed: SWAT: Small world-based attacker traceback in ad-hoc networks. The Second Annual International Conference on Mobile and Ubiquitous Systems, San Diego, USA 2005."},{"issue":"7","key":"30_CR17","doi-asserted-by":"publisher","first-page":"539","DOI":"10.4304\/jnw.4.7.539-551","volume":"4","author":"Slim Rekhis","year":"2009","unstructured":"Rekhis Slim, Boudriga Noureddine: Investigating attack scenarios in multihop wireless systems. Journal of networks 2009, 4(7):539-551.","journal-title":"Journal of networks"},{"issue":"2","key":"30_CR18","first-page":"99","volume":"4","author":"Somnath Ghosh","year":"2009","unstructured":"Ghosh Somnath, Veeraraghavan Prakash, Singh Samar, Zhang Lei: Performance of a wireless sensor network mac protocol with a global sleep schedule. International Journal of Multimedia and Ubiquitous Engineering 2009, 4(2):99-114.","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"issue":"1","key":"30_CR19","first-page":"39","volume":"3","author":"Lei Huang","year":"2008","unstructured":"Huang Lei, Liu Lixiang: Extended watchdog mechanism for wireless sensor networks. Journal of Information and Computing Science 2008, 3(1):39-48.","journal-title":"Journal of Information and Computing Science"},{"issue":"4","key":"30_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/964723.383060","volume":"31","author":"Alex C Snoeren","year":"2001","unstructured":"Snoeren AlexC, Partridge Craig, Sanchez LuisA, Jones ChristineE, Tchakountio Fabrice, Kent StephenT, Timothy Strayer W: Hash-based IP traceback. ACM SIGCOMM Computer Communication Review 2001, 31(4):3-14. 10.1145\/964723.383060","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/11856214_7","volume-title":"Proceedings of 9th International Symposium On Recent Advances In Intrusion Detection, Hamburg, Germany","author":"Vaibhav Mehta","year":"2006","unstructured":"Mehta Vaibhav, Bartzis Constantinos, Zhu Haifeng, Clarke EdmundM, Wing JeannetteM: Ranking attack graphs. Proceedings of 9th International Symposium On Recent Advances In Intrusion Detection, Hamburg, Germany 2006, 127-144."},{"key":"30_CR22","first-page":"29","volume-title":"proceedings of Seventh Workshop on Education in Computer Security (WECS7), Monterey, California","author":"Jide B Odubiyi","year":"2006","unstructured":"Odubiyi JideB, O'Brien CaseyW: Information security attack tree modeling. proceedings of Seventh Workshop on Education in Computer Security (WECS7), Monterey, California 2006, 29-37."},{"key":"30_CR23","first-page":"1","volume":"5","author":"Eugen Leontie","year":"2010","unstructured":"Leontie Eugen, Bloom Gedare, Gelbart Olga, Narahari Bhagirath, Simha Rahul: A compiler-hardware technique for protecting against buffer overflow attacks. Journal of Information Assurance and Security 2010, 5: 1-8.","journal-title":"Journal of Information Assurance and Security"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2011-39\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-39.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-39.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T16:36:44Z","timestamp":1548088604000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2011-39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,13]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["30"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2011-39","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,13]]},"article-number":"39"}}