{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:28Z","timestamp":1767339868002,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.23919\/ascc56756.2022.9828257","type":"proceedings-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T19:38:23Z","timestamp":1658345903000},"page":"383-388","source":"Crossref","is-referenced-by-count":6,"title":["An Improved Security OLSR Protocol against Black Hole Attack based on FANET"],"prefix":"10.23919","author":[{"given":"Shanyao","family":"Ren","sequence":"first","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Dongyu","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Qinglei","family":"Hu","sequence":"additional","affiliation":[{"name":"Beihang University,School of Automation Science and Electrical Engineering,Beijing,China"}]},{"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University,School of Cyber Science and Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-016-2377-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106877"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.03.004"},{"key":"ref6","first-page":"1","article-title":"Attacks against olsr: Distributed key management for security","volume-title":"2nd OLSR Interop\/Workshop","volume":"14","author":"Adjih"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1723-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5903-2_45"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1176-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5564"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2016.04.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.03.008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2014.7019290"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2414819"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2018.8633484"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3034523"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937263"}],"event":{"name":"2022 13th Asian Control Conference (ASCC)","start":{"date-parts":[[2022,5,4]]},"location":"Jeju, Korea, Republic of","end":{"date-parts":[[2022,5,7]]}},"container-title":["2022 13th Asian Control Conference (ASCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9828005\/9828007\/09828257.pdf?arnumber=9828257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T06:17:33Z","timestamp":1706768253000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9828257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/ascc56756.2022.9828257","relation":{},"subject":[],"published":{"date-parts":[[2022,5,4]]}}}