{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T21:59:39Z","timestamp":1767045579218},"reference-count":94,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Control"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.3166\/ejc.13.105-133","type":"journal-article","created":{"date-parts":[[2007,5,30]],"date-time":"2007-05-30T08:12:40Z","timestamp":1180512760000},"page":"105-133","source":"Crossref","is-referenced-by-count":15,"title":["Security and Trust for Wireless Autonomic Networks Systems and Control Methods"],"prefix":"10.1016","volume":"13","author":[{"given":"John S.","family":"Baras","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.3166\/ejc.13.105-133_bib0005","unstructured":"Autonomic communication. [Online]. Available: http:\/\/www.autonomic-communication.org."},{"key":"10.3166\/ejc.13.105-133_bib0010","doi-asserted-by":"crossref","unstructured":"AUVs: in space, air, water, and on the ground. IEEE Control Systems Magazine, vol. 20, pp. 15\u201318, December 2000.","DOI":"10.1109\/MCS.2000.887445"},{"key":"10.3166\/ejc.13.105-133_bib0015","series-title":"SIGCOMM\u2019 04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","first-page":"121","article-title":"Link-level measurements from an 802.11b meshnetwork","author":"Aguayo","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0020","series-title":"Security Engineering","author":"Anderson","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0025","series-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS\u2019 99)","first-page":"1","article-title":"The base-rate fallacy and its implications for the difficulty of intrusion detection","author":"Axelsson","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0030","series-title":"Synchronization and Linearity: An Algebra for Discrete Event Systems","author":"Baccelli","year":"1992"},{"key":"10.3166\/ejc.13.105-133_bib0035","series-title":"Proceedings of the 45th FITCE Congress","article-title":"Emerging wireless technologies and services: for better quality of life and work. Invited plenary address","author":"Baras","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0040","series-title":"Proceedings of the 23rd Army Science Conference","article-title":"On-line detection of distributed attacks from space-time network flow patterns","author":"Baras","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0045","series-title":"Proceedings of the 2004 IEEE Conference on Decision and Control","first-page":"93","article-title":"Cooperative games, phase transitions on graphs and distributed trust in MANET","author":"Baras","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0050","series-title":"Proceedings of the 24thArmy Science Conference","article-title":"Dynamic and distributed trust for mobile ad-hocnetworks","author":"Baras","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0055","series-title":"Advances in Control, Communication Networks, and Transportation Systems, Birkh\u00e4user,","first-page":"183","article-title":"ooperation, trust and games in wireless networks","author":"Baras","year":"2005"},{"key":"10.3166\/ejc.13.105-133_bib0060","series-title":"Detection of Abrupt Changes: Theory and Application","author":"Basseville","year":"1993"},{"key":"10.3166\/ejc.13.105-133_bib0065","series-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects,","first-page":"185","article-title":"The role of trust management in distributed systems security","author":"Blaze","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0070","series-title":"Swarm Intelligence: From Natural to Artificial Systems","author":"Bonabeau","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0075","volume":"31","author":"Br\u00e9maud","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0080","series-title":"Proceedings of Tenth Euromicro PDP (Parallel, Distributed and Networkbased Processing)","first-page":"403","article-title":"Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks","author":"Buchegger","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0085","series-title":"Proceedings of ACM New Security Paradigms Workshop 2002","first-page":"28","article-title":"Small worlds in security systems: an analysis of the PGP certificate graph","author":"\u010capkun","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0090","series-title":"Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003)","article-title":"Mobility h elps security in ad hoc networks","author":"\u010capkun","year":"2003"},{"key":"10.3166\/ejc.13.105-133_bib0095","series-title":"Proceedings of the 25th Army Science Conference","article-title":"A unified framework of information assurance for the design and analysis of security algorithms","author":"C\u00e1rdenas","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0100","series-title":"Proceedings of AAAI 06 Workshop on Evaluation Methods for Machine Learning","article-title":"Evaluation of classifiers and learning rules: Considerations for security applications","author":"C\u00e1rdenas","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0105","series-title":"Proceedings of the 2004 IEEE American Control Conference (ACC)","first-page":"1008","article-title":"Distributed change detection and filtering for worms, ddos and other network attacks","author":"C\u00e1rdenas","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0110","article-title":"A framework for. the evaluation of intrusion detection systems","author":"C\u00e1rdenas","year":"2006","journal-title":"May 21\u201324"},{"key":"10.3166\/ejc.13.105-133_bib0115","series-title":"Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN 04)","first-page":"17","article-title":"Detection and prevention of MAC layer misbehavior in ad hoc networks","author":"C\u00e1rdenas","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0120","series-title":"Proceedings of the 26th Annual IEEE Conference on Computer Communications, (IEEE INFOCOM 2007)","article-title":"Performance comparison of detection schemes for MAC layer misbehavior","author":"C\u00e1rdenas","year":"2007"},{"key":"10.3166\/ejc.13.105-133_bib0125","article-title":"Mobile Ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations","author":"Corson","year":"1999","journal-title":"RFC 2501, IETF"},{"key":"10.3166\/ejc.13.105-133_bib0130","first-page":"195","article-title":"Internet worms and global routing instabilities","volume":"4868","author":"Cowie","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0135","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1287\/mnsc.49.10.1407.17308","article-title":"The digitization of word-of-mouth: Promise and challenges of online reputation mechanism","volume":"49","author":"Dellarocas","year":"2003","journal-title":"Management Science"},{"key":"10.3166\/ejc.13.105-133_bib0140","series-title":"Proceedings of the ESORICS 2005, 10thEuropean Symposium on Researchin Computer Security","first-page":"267","article-title":"Towards a theory of intrusion detection","author":"Di Crescenzo","year":"2005"},{"key":"10.3166\/ejc.13.105-133_bib0145","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","article-title":"A note on two problems in connection with graphs","volume":"1","author":"Dijkstra","year":"1959","journal-title":"Numerische Mathematik"},{"issue":"7","key":"10.3166\/ejc.13.105-133_bib0150","doi-asserted-by":"crossref","first-page":"2448","DOI":"10.1109\/18.796383","article-title":"Multihypothesis Sequential probability ratio tests-part 1: Asymptotic optimality","volume":"45","author":"Dragalin","year":"1999","journal-title":"IEEE Trans Inf Theory"},{"key":"10.3166\/ejc.13.105-133_bib0155","series-title":"Proceedings of the MobiCom\u201904, 10th Annual International Conference on Mobile Computing and Networking","first-page":"114","article-title":"Routing in multi-radio, multi-hop wireless mesh networks","author":"Draves","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0160","series-title":"Networks and Groups: Models of Strategic Formation","author":"Dutta","year":"2003"},{"key":"10.3166\/ejc.13.105-133_bib0165","series-title":"Proceedings of 40thAnnual Meeting of the Association for Computational Linguistics","first-page":"1","article-title":"Parameter estimation for probabilistic finitestate transducers","author":"Eisner","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0170","series-title":"Data Mining for Security Applications,","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"Eskin","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0175","series-title":"Introduction to Theory of Games: Concepts, Methods Applications","author":"Forg\u00f3F","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0180","series-title":"Proceedings of 2001 IEEE Symposium on Security and Privacy","first-page":"50","article-title":"Evaluation of intrusion detectors: A decision theory approach","author":"Gaffney","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0185","first-page":"837","article-title":"Two continuum models for the spreading of myxobacteria swarms","volume":"68","author":"Gallegos","year":"2006","journal-title":"Bull MathBiol"},{"key":"10.3166\/ejc.13.105-133_bib0190","unstructured":"Gnutella. [Online]. Available: http:\/\/www.gnutella.com."},{"key":"10.3166\/ejc.13.105-133_bib0195","series-title":"Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS\u2019 06)","first-page":"90","article-title":"Measuring intrusion detection capability: An information-theoretic approach","author":"Gu","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0200","article-title":"Rigorous automated network security management","author":"Guttman","year":"2003","journal-title":"The MITRE Corp., Tech. Rep."},{"key":"10.3166\/ejc.13.105-133_bib0205","series-title":"Proceedings of the 10th USENIX Security Symposium","first-page":"115","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-toend protocol semantics","author":"Handley","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0210","series-title":"Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001)","first-page":"146","article-title":"The quest for security in mobile ad hoc networks","author":"Hubaux","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0215","unstructured":"IETF Mobile Ad-hoc Networks (manet) working group. [Online]. Available: http:\/\/www.ietf.org\/html.charters\/manet-charter.html."},{"key":"10.3166\/ejc.13.105-133_bib0220","unstructured":"Internet Security Systems Inc. Internet risk impact summary for June 25, 2002\u2013September 27, 2002."},{"issue":"6","key":"10.3166\/ejc.13.105-133_bib0225","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TAC.2003.812781","article-title":"Coordination of groups of mobile autonomous agents using nearest neighbor rules","volume":"48","author":"Jadbabaie","year":"2003","journal-title":"IEEE Trans Autom Control"},{"key":"10.3166\/ejc.13.105-133_bib0230","series-title":"Proceedings of the 2nd International Network Optimization Conference","article-title":"Autonomous trust establishment","author":"Jiang","year":"2005"},{"key":"10.3166\/ejc.13.105-133_bib0235","series-title":"Proceedings WiOpt","article-title":"Fundamental Tradeoffs and Constrained Coalitional Games in Autonomic Wireless Networks","author":"Jiang","year":"2007"},{"key":"10.3166\/ejc.13.105-133_bib0240","series-title":"Proceedings of the 25th Conference on Computer Communications (IEEE Infocom 2006)","article-title":"Trust evaluation in anarchy: A case study on autonomous networks","author":"Jiang","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0245","series-title":"Proceedings of the 25th Army Science Conference","article-title":"Coalition formation in manets","author":"Jiang","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0250","series-title":"Network Security \u2013 Private Communications in a Public World","author":"Kaufman","year":"1995"},{"key":"10.3166\/ejc.13.105-133_bib0255","article-title":"Markov Random Fields and Their Applications Contemporary Mathematics","volume":"1","author":"Kindermann","year":"1980","journal-title":"American Mathematical Society"},{"key":"10.3166\/ejc.13.105-133_bib0260","series-title":"Proceedings of the 2005 USENIX Security Symposium","first-page":"161","article-title":"Automating mimicry attacks using static binary analysis","author":"Kruegel","year":"2005"},{"key":"10.3166\/ejc.13.105-133_bib0265","series-title":"Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)","first-page":"14","article-title":"Bayesian event classification for intrusion detection","author":"Kruegel","year":"2003"},{"key":"10.3166\/ejc.13.105-133_bib0270","series-title":"Proceedings of the AusCERT Asia Pacific Information Technology Security Conference","article-title":"Reverse engineering of network signatures","author":"Kruegel","year":"2005"},{"key":"10.3166\/ejc.13.105-133_bib0275","series-title":"Proceedings of the 7th USENIX Security Symposium","article-title":"Data mining approaches for intrusion detection","author":"Lee","year":"1998"},{"key":"10.3166\/ejc.13.105-133_bib0280","series-title":"Proceedings of the IEEE Symposium on Security & Privacy","first-page":"120","article-title":"A data mining framework for building intrusion detection models","author":"Lee","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0285","series-title":"DARPA Information Survivability Conference and Exposition","first-page":"12","article-title":"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation","author":"Lippmann","year":"2000"},{"key":"10.3166\/ejc.13.105-133_bib0290","series-title":"Proceedings of the 6th Annual International Conference on Mobile Computing and Networking","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"Marti","year":"2000"},{"issue":"61","key":"10.3166\/ejc.13.105-133_bib0295","first-page":"60","article-title":"The small world problem","volume":"1","author":"Milgram","year":"1967","journal-title":"Psychol Today"},{"issue":"3","key":"10.3166\/ejc.13.105-133_bib0300","first-page":"321","article-title":"Semiring frameworks and algorithms for shortest-distance problems","volume":"7","author":"Mohri","year":"2002","journal-title":"J Autom Lang Comb"},{"issue":"5","key":"10.3166\/ejc.13.105-133_bib0305","doi-asserted-by":"crossref","first-page":"1965","DOI":"10.1109\/18.705575","article-title":"Quickest detection of abrupt changes for a class of random process","volume":"44","author":"Moustakides","year":"1998","journal-title":"IEEE Trans Inf Theory"},{"key":"10.3166\/ejc.13.105-133_bib0310","unstructured":"National Science Foundation. Future Internet Network Design Program, December 2005. USA NSF FIND Program Description."},{"key":"10.3166\/ejc.13.105-133_bib0315","series-title":"Statistical Physics of Spin Glasses and Information Processing: An Introduction","author":"Nishimori","year":"2001"},{"issue":"9","key":"10.3166\/ejc.13.105-133_bib0320","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1109\/TAC.2004.834113","article-title":"Consensus problems in networks of agents withswitch ing topology and timedelays","volume":"49","author":"Olfati-Saber","year":"2004","journal-title":"IEEE Trans Autom Control"},{"issue":"3","key":"10.3166\/ejc.13.105-133_bib0325","first-page":"203","article-title":"Robust classification for imprecise environments","volume":"42","author":"Provost","year":"2001","journal-title":"MachLearn"},{"key":"10.3166\/ejc.13.105-133_bib0330","article-title":"Insertion, evasion and denial of service: Eluding network intrusion detection","author":"Ptacek","year":"1998","journal-title":"Secure Networks, Inc., Tech. Rep"},{"key":"10.3166\/ejc.13.105-133_bib0335","series-title":"Proceedings of the 15th IST Mobile and Wireless Summit","article-title":"Detection and performance analysis of greedy individual and colluding MAC layer attackers","author":"Radosavac","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0340","series-title":"Proceedings of the SASN\u2019 06: Fourth ACM Workshop on Security of Ad hoc and Sensor Networks","first-page":"135","article-title":"Impact of optimal mac layer attacks on the network layer","author":"Radosavac","year":"2006"},{"issue":"1","key":"10.3166\/ejc.13.105-133_bib0345","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/JCS-2007-15105","article-title":"Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers","volume":"15","author":"Radosavac","year":"2007","journal-title":"J Computer Security: Special Issue on Security of Ad Hoc and Sensor Networks"},{"key":"10.3166\/ejc.13.105-133_bib0350","unstructured":"Radosavac S, Moustakides GV, Baras JS, Koutsopoulos I. An analytic framework for modeling and detecting access layer misbehavior in wireless networks. To appear in ACM Transactions on Information and System Security.(TISSEC)."},{"key":"10.3166\/ejc.13.105-133_bib0355","series-title":"Proceedings of the Second International Conference on Mobile Systems, Applications and Services (MobiSys2004)","first-page":"84","article-title":"DOMINO: A system to detect greedy behavior in IEEE 802.11 Hotspots","author":"Raya","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0360","doi-asserted-by":"crossref","unstructured":"Rote G. Pathproblems in graphs. Computing Supplementum, vol. 7, pp. 155-189, 1990. [Online]. Available: http:\/\/www.inf.fu-berlin.de\/rote\/Papers\/postscript\/Path\u00feproblems\u00fein\u00fegraphs.ps.","DOI":"10.1007\/978-3-7091-9076-0_9"},{"key":"10.3166\/ejc.13.105-133_bib0365","series-title":"Applied Cryptography","author":"Schneier","year":"1996"},{"key":"10.3166\/ejc.13.105-133_bib0370","series-title":"Proceedings of the 2003 IEEE Symposium on Security & Privacy","first-page":"44","article-title":"Active mapping: Resisting NIDS evasion without altering traffic","author":"Shankar","year":"2003"},{"key":"10.3166\/ejc.13.105-133_bib0375","series-title":"Social and Economic Networks in Cooperative Game Theory","author":"Slikker","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0380","series-title":"Information Security: Principles and Practice","author":"Stamp","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0385","series-title":"Proceedings of the 11th USENIX Security Symposium (Security\u2019 02)","article-title":"How to own the internet in your spare time","author":"Staniford","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0390","series-title":"Proceedings of the ACM SIGCOMM\u2019 01 Conference","first-page":"149","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"Stoica","year":"2001"},{"key":"10.3166\/ejc.13.105-133_bib0395","series-title":"Proceeedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)","first-page":"54","article-title":"Undermining an anomaly-based intrusion detection system using common exploits","author":"Tan","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0400","series-title":"Information Hiding: 5th International Workshop","first-page":"1","article-title":"Hiding intrusions: From the abnormal to the normal and beyond","author":"Tan","year":"2002"},{"key":"10.3166\/ejc.13.105-133_bib0405","series-title":"Proceedings of the 2004 ACM workshop on Wireless security","first-page":"1","article-title":"Trust evaluation in adhoc networks","author":"Theodorakopoulos","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0410","series-title":"Proceedings of the IEEE Globecom 2006","article-title":"A game for ad hoc network connectivity in the presence of malicious users","author":"Theodorakopoulos","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0415","series-title":"Proceedings of the Second IEEE Communications Society\/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006)","article-title":"Enhancing benign user cooperation in the presence of malicious adversaries in ad hoc networks","author":"Theodorakopoulos","year":"2006"},{"key":"10.3166\/ejc.13.105-133_bib0420","series-title":"Proceedings of the 17th International Symposium on Mathematical Theory of Networks and Systems, MTNS 2006","first-page":"509","article-title":"Linear iterations on ordered semirings for trust metric computation and attack resiliency evaluation","author":"Theodorakopoulos","year":"2006"},{"issue":"2","key":"10.3166\/ejc.13.105-133_bib0425","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","article-title":"On trust models and trust evaluation metrics for ad hoc networks","volume":"24","author":"Theodorakopoulos","year":"2006","journal-title":"IEEE J Selected Areas in Communications"},{"key":"10.3166\/ejc.13.105-133_bib0430","series-title":"Proceedings of the IEEE Infocom 2007","article-title":"Malicious users in unstructured networks","author":"Theodorakopoulos","year":"2007"},{"key":"10.3166\/ejc.13.105-133_bib0435","series-title":"Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS)","first-page":"21","article-title":"Testing networkbased intrusion detection signatures using mutant exploits","author":"Vigna","year":"2004"},{"key":"10.3166\/ejc.13.105-133_bib0440","series-title":"Sequential Analysis","author":"Wald","year":"1947"},{"key":"10.3166\/ejc.13.105-133_bib0445","first-page":"326","article-title":"Optimum character of the sequential probability ratio test","volume":"19","author":"Wald","year":"1948","journal-title":"Ann MathStatist"},{"key":"10.3166\/ejc.13.105-133_bib0450","series-title":"Proceedings of the 1999 IEEE Symposium on Security & Privacy","first-page":"133","article-title":"Detecting intrusions using system calls: Alternative data models","author":"Warrender","year":"1999"},{"key":"10.3166\/ejc.13.105-133_bib0455","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018smallworld\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"10.3166\/ejc.13.105-133_bib0460","unstructured":"Wierzchon S. (2002) Ising model. Eric Weisstein's World of Physics. [Online]. Available: http:\/\/scienceworld. wolfram.com\/physics\/IsingModel.html."},{"key":"10.3166\/ejc.13.105-133_bib0465","series-title":"Proceedings of the SASN 2003","first-page":"761","article-title":"Modeling vulnerabilities of ad hoc routing protocols","author":"Yang","year":"2003"},{"issue":"5","key":"10.3166\/ejc.13.105-133_bib0470","first-page":"545","article-title":"Intrusion detection techniques for mobile wireless networks","volume":"9","author":"Zhang","year":"2003","journal-title":"ACM\/Kluwer Mobile Networks and Applications (MONET)"}],"container-title":["European Journal of Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0947358007708154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0947358007708154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:41:48Z","timestamp":1556455308000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0947358007708154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":94,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["S0947358007708154"],"URL":"https:\/\/doi.org\/10.3166\/ejc.13.105-133","relation":{},"ISSN":["0947-3580"],"issn-type":[{"value":"0947-3580","type":"print"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}