{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:37:52Z","timestamp":1730342272537,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659549","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"240-246","source":"Crossref","is-referenced-by-count":1,"title":["Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification"],"prefix":"10.23919","author":[{"given":"Teng","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Qingqi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2165-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962856"},{"key":"ref13","first-page":"1","article-title":"Srdpv: secure route discovery and privacy-preserving verification in manets","author":"li","year":"2017","journal-title":"Wireless Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070577"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2013.132"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.64"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.119"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626335"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879202"},{"key":"ref6","first-page":"20","article-title":"X-trace: A pervasive network tracing framework","author":"fonseca","year":"2007","journal-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation"},{"key":"ref5","first-page":"307","article-title":"X-ray: Automating root-cause diagnosis of performance anomalies in production software","volume":"12","author":"attariyan","year":"2012","journal-title":"OSDI"},{"key":"ref8","article-title":"Mining invariants from console logs for system problem detection","author":"lou","year":"2010","journal-title":"USENIX Annual Technical Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6710069"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851220"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2313865"},{"key":"ref20","article-title":"Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring","volume":"16","author":"schwartz","year":"2013","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2670529.2754963"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27137-8_33"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0334-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2017.21"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375190"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659549.pdf?arnumber=8659549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:20:39Z","timestamp":1598221239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659549","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}