{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:49:57Z","timestamp":1725428997888},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/ares.2008.74","type":"proceedings-article","created":{"date-parts":[[2008,5,29]],"date-time":"2008-05-29T13:54:16Z","timestamp":1212069256000},"page":"484-490","source":"Crossref","is-referenced-by-count":1,"title":["SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol"],"prefix":"10.1109","author":[{"given":"Xiang-he","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hua-ping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"18"},{"journal-title":"Totally Accurate Clock FTP Site","year":"0","author":"clark","key":"15"},{"journal-title":"Data sheet and specifications for trimble thunderbolt GPS disciplined clock","year":"0","key":"16"},{"year":"0","key":"13"},{"key":"14","article-title":"mitigating routing misbehavior in mobile ad hoc networks","author":"sergio marti","year":"2000","journal-title":"International conference on Mobile computing and networking"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"1","first-page":"103","article-title":"secure border gateway protocol (s-bgp) - real world performance and deployment issues","author":"kent","year":"2000","journal-title":"Proceedings of NDSS"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"journal-title":"Network layer protocols with Byzantine robustness","year":"1998","author":"perlman","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"year":"0","key":"8"}],"event":{"name":"2008 Third International Conference on Availability, Reliability and Security","start":{"date-parts":[[2008,3,4]]},"end":{"date-parts":[[2008,3,7]]}},"container-title":["2008 Third International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4529302\/4529303\/04529378.pdf?arnumber=4529378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:30:55Z","timestamp":1489663855000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4529378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ares.2008.74","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}