{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T22:42:40Z","timestamp":1649198560249},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00607-013-0325-1","type":"journal-article","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T03:22:29Z","timestamp":1367896949000},"page":"855-874","source":"Crossref","is-referenced-by-count":9,"title":["Detecting bad information in mobile wireless networks based on the wireless application protocol"],"prefix":"10.1007","volume":"96","author":[{"given":"Weizhe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"You","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"325_CR1","unstructured":"Mason D, Jose JM, Joseph A (2002) WapSearch: a system for searching the web using WAP enabled devices. In: NDDL, pp 29\u201338"},{"key":"325_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2009.40","volume":"7","author":"V Roussev","year":"2009","unstructured":"Roussev V (2009) Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy 7:49\u201355","journal-title":"IEEE Secur Privacy"},{"key":"325_CR3","first-page":"6","volume":"32","author":"Y Zhu","year":"2012","unstructured":"Zhu Y (2012) Introducing google chart tools and google maps API in data visualization courses. IEEE Comput Graph Appl 32:6\u20139","journal-title":"IEEE Comput Graph Appl"},{"key":"325_CR4","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.comcom.2004.12.001","volume":"28","author":"T Lin","year":"2005","unstructured":"Lin T, Wang K, Liu A (2005) An efficient load balancing strategy for scalable WAP gateways. Comput Commun 28:1028\u20131037","journal-title":"Comput Commun"},{"key":"325_CR5","doi-asserted-by":"crossref","unstructured":"Agustina JV, Zhang P, Kantola R (2003) Performance evaluation of GSM handover traffic in a GPRS\/GSM network. In: ISCC, pp 137\u2013142","DOI":"10.1109\/ISCC.2003.1214113"},{"key":"325_CR6","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TMC.2003.1233528","volume":"2","author":"H Rutagemwa","year":"2003","unstructured":"Rutagemwa H, Shen X (2003) Modeling and Analysis of WAP Performance over Wireless Links. IEEE Trans Mob Comput 2:221\u2013232","journal-title":"IEEE Trans Mob Comput"},{"key":"325_CR7","doi-asserted-by":"crossref","unstructured":"Yu S, Cai D, Wen J, Ma W (2003) Improving pseudo-relevance feedback in web information retrieval using web page segmentation. In: WWW, pp 11\u201318","DOI":"10.1145\/775152.775155"},{"key":"325_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34:1\u201347","journal-title":"ACM Comput Surv"},{"key":"325_CR9","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18:613\u2013620","journal-title":"Commun ACM"},{"key":"325_CR10","doi-asserted-by":"crossref","unstructured":"Salton G, Buckley C (1990) Improving retrieval performance by relevance feedback. In: JASIS, pp 288\u2013297","DOI":"10.1002\/(SICI)1097-4571(199006)41:4<288::AID-ASI8>3.0.CO;2-H"},{"issue":"1","key":"325_CR11","first-page":"35","volume":"5","author":"K Sharma","year":"2011","unstructured":"Sharma K, Ghose MK (2011) Cross layer security framework for wireless sensor networks. Int J Security Appl 5(1):35\u201352","journal-title":"Int J Security Appl"},{"key":"325_CR12","unstructured":"Joachims T (1998) Text categorization with suport vector machines: learning with many relevant features. In: ECML, pp 137\u2013142"},{"key":"325_CR13","doi-asserted-by":"crossref","unstructured":"Chang C, Lin C (2011) LIBSVM: a library for support vector machines. In: ACM TIST, pp 27\u201327","DOI":"10.1145\/1961189.1961199"},{"issue":"1","key":"325_CR14","first-page":"1","volume":"7","author":"J Xu","year":"2013","unstructured":"Xu J, Wang J, Xie S, Chen W, Kim JU (2013) Study on intrusion detection policy for wireless sensor networks. Int J Security Appl 7(1):1\u20136","journal-title":"Int J Security Appl"},{"key":"325_CR15","doi-asserted-by":"crossref","unstructured":"Baohuai S, Jianli W, Ping L (2008) The covering number for some Mercer kernel Hilbert spaces. J Complex 24:241\u2013258","DOI":"10.1016\/j.jco.2007.04.001"},{"issue":"3","key":"325_CR16","first-page":"1","volume":"2","author":"K Mitra","year":"2009","unstructured":"Mitra K, Bhattacharyya D, Sattarova FY, Kim T (2009) A heuristic approach for mobile phone bases information management system in wireless sensor network. Int J Grid Dist Comp 2(3):1\u201312","journal-title":"Int J Grid Dist Comp"},{"key":"325_CR17","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C Hsu","year":"2002","unstructured":"Hsu C, Lin C (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13:415\u2013425","journal-title":"IEEE Trans Neural Netw"},{"issue":"3","key":"325_CR18","first-page":"23","volume":"5","author":"B Musznicki","year":"2012","unstructured":"Musznicki B, Zwierzykowski P (2012) Survey of simulators for wireless sensor networks. Int J Grid Dist Comput 5(3):23\u201350","journal-title":"Int J Grid Dist Comput"},{"key":"325_CR19","volume-title":"Introduction to modern information retrieval","author":"G Salton","year":"1984","unstructured":"Salton G, McGill M (1984) Introduction to modern information retrieval. McGraw-Hill Inc., New York"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0325-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0325-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0325-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T09:12:25Z","timestamp":1563009145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0325-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":19,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["325"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0325-1","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,8]]}}}