{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:14:56Z","timestamp":1764897296835,"version":"3.46.0"},"reference-count":0,"publisher":"Canadian Center of Science and Education","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIS"],"DOI":"10.5539\/cis.v4n1p151","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T02:37:43Z","timestamp":1400035063000},"source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection Techniques for Detecting Misbehaving Nodes"],"prefix":"10.5539","volume":"4","author":[{"given":"Farzaneh","family":"Pakzad","sequence":"first","affiliation":[]},{"given":"Marjan Kuchaki","family":"Rafsanjani","sequence":"additional","affiliation":[]}],"member":"3486","published-online":{"date-parts":[[2010,12,20]]},"container-title":["Computer and Information Science"],"original-title":[],"link":[{"URL":"https:\/\/www.ccsenet.org\/journal\/index.php\/CIS\/article\/download\/8281\/8046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:12:22Z","timestamp":1764897142000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/8281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2010,12,20]]}},"URL":"https:\/\/doi.org\/10.5539\/cis.v4n1p151","relation":{},"ISSN":["1913-8997","1913-8989"],"issn-type":[{"type":"electronic","value":"1913-8997"},{"type":"print","value":"1913-8989"}],"subject":[],"published":{"date-parts":[[2010,12,20]]}}}