{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:20Z","timestamp":1725808400453},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_78","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"707-712","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent Intrusion Detection System in Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Abdur Rahaman","family":"Sardar","sequence":"first","affiliation":[]},{"given":"Rashmi Ranjan","family":"Sahoo","sequence":"additional","affiliation":[]},{"given":"Moutushi","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Souvik","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Jamuna Kanta","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Koushik","family":"Majumder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"78_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"78_CR2","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireless Networking\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networking"},{"unstructured":"Sardar, A.R., Singh, M., Sarkar, S.K.: Intrusion detection in wireless sensor networks using fuzzy logic. Published in the Proc. of IEMCON 2012 held at Science City Auditoriam, Kolkata, January 17-18 (2012)","key":"78_CR3"},{"unstructured":"Singh, M., Das, R.: A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network. International Journal of Scientific and Engineering Research\u00a03(10) (October 2012)","key":"78_CR4"},{"issue":"1","key":"78_CR5","first-page":"5","volume":"I","author":"N. Sultana","year":"2007","unstructured":"Sultana, N., Huh, E.-N.: Application driven cluster based group key management with identifier in wireless sensor network. Transaction on Internet and Information System\u00a0I(1), 5\u201318 (2007)","journal-title":"Transaction on Internet and Information System"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys 2004, November 3-5, pp. 162\u2013175 (2004)","key":"78_CR6","DOI":"10.1145\/1031495.1031515"},{"unstructured":"Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.: On Optimal Placement of Intrusion Detection Modules in Sensor Networks. In: Proceedings of the First International Conference on Broadband Networks (2004)","key":"78_CR7"},{"unstructured":"Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: A non-cooperative game approach. In: Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004, August 30-September 1, pp. 343\u2013346 (2004)","key":"78_CR8"},{"key":"78_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/15501320600692044","volume":"2","author":"C.E. Loo","year":"2006","unstructured":"Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks\u00a02, 313\u2013332 (2006)","journal-title":"International Journal of Distributed Sensor Networks"},{"unstructured":"Su, C.-C., Chang, K.-M., Kuo, Y.-H., Horng, M.-F.: The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE Wireless Communications and Networking Conference, March 13-17 (2005)","key":"78_CR10"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_78","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:53:51Z","timestamp":1676418831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_78","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}