{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:32:57Z","timestamp":1725679977163},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270358","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T14:41:36Z","timestamp":1254321696000},"page":"13-22","source":"Crossref","is-referenced-by-count":7,"title":["Exception triggered DoS attacks on wireless networks"],"prefix":"10.1109","author":[{"given":"Yao","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Sagar","family":"Vemuri","sequence":"additional","affiliation":[]},{"given":"Jiazhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"an analysis of dos attacks on wireless lan","author":"liu","year":"2006","journal-title":"IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET2006)"},{"key":"17","article-title":"a defense against worm-hole attacks in wireless network","author":"hu","year":"2003","journal-title":"IEEE INFOCOM"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3775"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5281"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4186"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"11","article-title":"802.11 denial-of-service attacks: real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"USENIX Security Symposium"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4851"},{"key":"21","article-title":"finite-state analysis of ssl 3.0","author":"mitchell","year":"1998","journal-title":"USENIX Security Symposium"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_13"},{"key":"22","article-title":"automated analysis of cryptographic protocols using murphi","author":"mitchell","year":"1997","journal-title":"IEEE Symp Security and Privacy"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_19"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375848"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2006.320346"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"journal-title":"Snort The lightweight network intrusion detection system","year":"2001","author":"roesch","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5216"},{"journal-title":"Madwifi OpenSource Driver","year":"0","key":"3"},{"journal-title":"LORCON library - LOss of Radio Connectivity","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4187"},{"journal-title":"Aircrack-ng","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5106"},{"year":"0","key":"7"},{"year":"0","author":"supplicant","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270358"},{"journal-title":"The network simulator - ns-2","year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"year":"2002","key":"8"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems & Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270358.pdf?arnumber=5270358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:51:20Z","timestamp":1489888280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270358","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}