{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:27Z","timestamp":1738777227526,"version":"3.37.0"},"reference-count":8,"publisher":"Academy Publisher","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.8.1852-1858","type":"journal-article","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:53:58Z","timestamp":1377132838000},"source":"Crossref","is-referenced-by-count":0,"title":["Research on Context Aware Network Security Model"],"prefix":"10.4304","volume":"8","author":[{"given":"XiaoHui","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xinmin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haiyan","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,8,12]]},"reference":[{"key":"ref1","first-page":"2P","article-title":"Tan Yubo, \"S Research","volume-title":"3rd IEEE International Conference on Volume","author":"Haowei","year":"2010","unstructured":"[2] Jiang Haowei; Tan Yubo, \"S Research in P2P-PKI trust model Computer Science and Information Technology (ICCSIT) \", 2010 3rd IEEE International Conference on Volume, pp. 114 \u2013 117, 2010."},{"key":"ref2","article-title":"Can we trust trust?","volume-title":"Trust Making and Breaking Cooperative Relations","author":"Gambetta","year":"1990","unstructured":"[3] Gambetta D, Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations, Basil Blackwell: Oxford Press.1990."},{"key":"ref3","first-page":"91","article-title":"F ayyad, \"Refining Initial Point for K-Means Clustering","volume-title":"Proceedings of the Fifteenth International Conference on Machine Learning","author":"Bradley","year":"1998","unstructured":"[4] Bradley P.S, Usama M.F ayyad, \"Refining Initial Point for K-Means Clustering\", Proceedings of the Fifteenth International Conference on Machine Learning, pp. 91-99, 1998."},{"key":"ref4","first-page":"607","article-title":"Hidetsune Kobayashi, \"Intrusion Detection Systems: Technology and Development","volume-title":"Proceedings of the 17th International Conference on Advanced Information Networking and Applications","author":"Bai","year":"2003","unstructured":"[5] Yuelin Bai, Hidetsune Kobayashi, \"Intrusion Detection Systems: Technology and Development\", In: Proceedings of the 17th International Conference on Advanced Information Networking and Applications, pp. 607-610, 2003."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/72.363440"},{"key":"ref6","first-page":"1","article-title":"A Semantic Clustering Routing Protocol for Wireless Sensor Networks","volume-title":"IEEE Consumer Communications and Networking Conference","author":"Bouhafs","year":"2006","unstructured":"[8] Bouhafs F,Merabti M,Mokhtar H, \"A Semantic Clustering Routing Protocol for Wireless Sensor Networks\", IEEE Consumer Communications and Networking Conference, pp. 1-4, 2006."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.046116"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","article-title":"A key-management scheme for distributed sensor networks","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communication Security","author":"Eschenauer","year":"2002","unstructured":"[10] Eschenauer L, Gligor V D, \"A key-management scheme for distributed sensor networks\", Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41-47, 2002"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:02:44Z","timestamp":1738774964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,12]]},"references-count":8,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2013,8,12]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.8.1852-1858","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,8,12]]}}}