{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:48Z","timestamp":1730301168597,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.216","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1741-1746","source":"Crossref","is-referenced-by-count":0,"title":["TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator"],"prefix":"10.1109","author":[{"given":"Chong","family":"Yan","sequence":"first","affiliation":[]},{"given":"Zhiping","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Huaqiang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.12.025"},{"key":"2","first-page":"609","article-title":"Opnet 2.4: An environment for communication network modeling and simulation","author":"desbrandes","year":"1993","journal-title":"Proceedings of the European Simulation Symposium"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2002.993531"},{"key":"6","first-page":"700","article-title":"Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed","volume":"2","author":"lucio","year":"2003","journal-title":"WSEAS Transactions on Computers"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1096166.1096174"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1406-3_2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_3"},{"journal-title":"NS2 Network Simulator NS2","year":"0","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2008.4582757"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681045.pdf?arnumber=6681045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:41:22Z","timestamp":1490229682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.216","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}