{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:35:37Z","timestamp":1729668937707,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccs.2014.7024862","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:26:19Z","timestamp":1423157179000},"page":"543-548","source":"Crossref","is-referenced-by-count":1,"title":["A neighborhood connectivity-based trust scheme to identify active black hole attacks"],"prefix":"10.1109","author":[{"given":"Ruo Jun","family":"Cai","sequence":"first","affiliation":[]},{"given":"Peter Han","family":"Joo Chong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.493"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.551-558"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986560"},{"journal-title":"Wireless Communications Networking and Mobile Computing","article-title":"The simulation and comparison of routing attacks on dsr protocol","year":"2009","author":"jiwen","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/FGCN.2007.184"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498351"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514290"},{"key":"8","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-642-37119-6_20","article-title":"Mitigating collaborative blackhole attacks on dsr-based mobile ad hoc networks","volume":"7743","author":"woungang","year":"2013","journal-title":"Foundations and Practice of Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.83"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832168"}],"event":{"name":"2014 IEEE International Conference on Communication Systems (ICCS)","start":{"date-parts":[[2014,11,19]]},"location":"Macau, China","end":{"date-parts":[[2014,11,21]]}},"container-title":["2014 IEEE International Conference on Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7002494\/7024749\/07024862.pdf?arnumber=7024862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:01:18Z","timestamp":1498194078000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7024862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccs.2014.7024862","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}