{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:20:22Z","timestamp":1725524422381},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642002236"},{"type":"electronic","value":"9783642002243"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00224-3_17","type":"book-chapter","created":{"date-parts":[[2009,1,28]],"date-time":"2009-01-28T04:11:29Z","timestamp":1233115889000},"page":"263-278","source":"Crossref","is-referenced-by-count":33,"title":["Cooperative Intrusion Detection in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Krontiris","sequence":"first","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[]},{"given":"Tassos","family":"Dimitriou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","first-page":"33","volume":"15","author":"V. Bhuse","year":"2006","unstructured":"Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks\u00a015(1), 33\u201351 (2006)","journal-title":"Journal of High Speed Networks"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1089761.1089765","volume-title":"Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet 2005)","author":"A.P. Silva da","year":"2005","unstructured":"da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet 2005), pp. 16\u201323. ACM Press, New York (2005)"},{"key":"17_CR3","unstructured":"Kargl, F., Klenk, A., Weber, M., Schlott, S.: Sensors for detection of misbehaving nodes in MANETs. In: Flegel, U., Meier, M. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany. LNI, vol.\u00a046, pp. 83\u201397. GI (2004)"},{"key":"17_CR4","unstructured":"Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference, Paris, France (April 2007)"},{"key":"17_CR5","unstructured":"Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors 2007), Wroclaw, Poland (July 2007)"},{"issue":"2\/3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/A:1013715909417","volume":"8","author":"J. Kulik","year":"2002","unstructured":"Kulik, J., Heinzelman, W., Balakrishnan, H.: Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless Networks\u00a08(2\/3), 169\u2013185 (2002)","journal-title":"Wireless Networks"},{"issue":"11","key":"17_CR7","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks (2005)","DOI":"10.1080\/15501320600692044"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"A. Mishra","year":"2004","unstructured":"Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications\u00a011(1), 48\u201360 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol.\u00a03, pp. 253\u2013259 (2005)","DOI":"10.1109\/WIMOB.2005.1512911"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM\u00a027(2), 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Woo, A., Tong, T., Culler, D.: Taming the underlying challenges of reliable multihop routing in sensor networks. In: SenSys 2003: Proceedings of the 1st international conference on Embedded networked sensor systems, pp. 14\u201327 (2003)","DOI":"10.1145\/958491.958494"}],"container-title":["Lecture Notes in Computer Science","Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00224-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:33:00Z","timestamp":1558092780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00224-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642002236","9783642002243"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00224-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}