{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:05:33Z","timestamp":1725613533779},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/infocom.2006.89","type":"proceedings-article","created":{"date-parts":[[2007,4,24]],"date-time":"2007-04-24T18:05:07Z","timestamp":1177437907000},"page":"1-2","source":"Crossref","is-referenced-by-count":14,"title":["Security: Cross Layer Protocol in Wireless Sensor Network"],"prefix":"10.1109","author":[{"given":"Rajani","family":"Muraleedharan","sequence":"first","affiliation":[]},{"given":"Lisa Ann","family":"Osadciw","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2006","author":"muraleedharan","article-title":"Cognitive Routing Protocol in Wireless Sensor Network Using Swarm Intelligence Approach","key":"3"},{"year":"2001","author":"kennedy","journal-title":"Swarm Intelligence","key":"2"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/MC.2002.1039518"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/CISS.2006.286400"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"4","article-title":"Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System","author":"muraleedharan","year":"2006","journal-title":"SPIE Defence and Security"}],"event":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","start":{"date-parts":[[2006,4,23]]},"location":"Barcelona, Spain","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4146652\/4146653\/04146742.pdf?arnumber=4146742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T16:40:24Z","timestamp":1497717624000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4146742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/infocom.2006.89","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}