{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:08:34Z","timestamp":1729638514041,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/his.2009.164","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T20:39:46Z","timestamp":1253911186000},"page":"264-267","source":"Crossref","is-referenced-by-count":16,"title":["Study of ZigBee Wireless Mesh Networks"],"prefix":"10.1109","author":[{"given":"Jing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xiaofen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","DOI":"10.4108\/e-forensics.2008.2654","article-title":"wireless network security: compare of wep mechanism, wpa and rsn security protocols","author":"ibrahim bulbul","year":"2008","journal-title":"Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications information and multimedia and workshop"},{"key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/WCN\/2006\/93830","article-title":"mac secruity and security overhead analysis in the ieee 802.15.4 wireless sensor networks, hindawi publishing corporation","volume":"2006","author":"xiao","year":"0","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.157"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577958"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278654"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2006.116"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/el:20064028"}],"event":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","start":{"date-parts":[[2009,8,12]]},"location":"Shenyang, China","end":{"date-parts":[[2009,8,14]]}},"container-title":["2009 Ninth International Conference on Hybrid Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5254288\/5254374\/05254462.pdf?arnumber=5254462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:08:04Z","timestamp":1497830884000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5254462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/his.2009.164","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}