{"id":"https://openalex.org/W2093009396","doi":"https://doi.org/10.1155/2008/754252","title":"Attack Distribution Modeling and Its Applications in Sensor Network Security","display_name":"Attack Distribution Modeling and Its Applications in Sensor Network Security","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2093009396","doi":"https://doi.org/10.1155/2008/754252","mag":"2093009396"},"language":"en","primary_location":{"id":"doi:10.1155/2008/754252","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/754252","pdf_url":null,"source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1155/2008/754252","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083239593","display_name":"Xiangqian Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiangqian Chen","raw_affiliation_strings":["Telecommunications and Information Technology Institute, Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Telecommunications and Information Technology Institute, Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089109183","display_name":"Kia Makki","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kia Makki","raw_affiliation_strings":["Telecommunications and Information Technology Institute, Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Telecommunications and Information Technology Institute, Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110040508","display_name":"Kang K. Yen","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kang Yen","raw_affiliation_strings":["Telecommunications and Information Technology Institute, Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Telecommunications and Information Technology Institute, Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111906965","display_name":"Niki Pissinou","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Niki Pissinou","raw_affiliation_strings":["Telecommunications and Information Technology Institute, Florida International University, Miami, FL"],"affiliations":[{"raw_affiliation_string":"Telecommunications and Information Technology Institute, Florida International University, Miami, FL","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083239593"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":1.5406,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.84895899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2008","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9270233511924744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5116046071052551},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4402883052825928},{"id":"https://openalex.org/keywords/distribution","display_name":"Distribution (mathematics)","score":0.42099496722221375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9270233511924744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5116046071052551},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4402883052825928},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.42099496722221375},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2008/754252","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/754252","pdf_url":null,"source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.fiu.edu:it2_fac-1001","is_oa":true,"landing_page_url":"https://digitalcommons.fiu.edu/it2_fac/2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401637","display_name":"Florida International University Digital Commons (Florida International University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I19700959","host_organization_name":"Florida International University","host_organization_lineage":["https://openalex.org/I19700959"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Telecommunications and Information Technology Institute","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:c2426d656ceb4cf8a1ed4ce232a4a36d","is_oa":true,"landing_page_url":"https://doaj.org/article/c2426d656ceb4cf8a1ed4ce232a4a36d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2008 (2008)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2008/754252","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/754252","pdf_url":null,"source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1543653153","https://openalex.org/W1590910518","https://openalex.org/W1786427715","https://openalex.org/W1962851278","https://openalex.org/W2002054891","https://openalex.org/W2045028348","https://openalex.org/W2071043548","https://openalex.org/W2099574482","https://openalex.org/W2110099156","https://openalex.org/W2111609524","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2127699957","https://openalex.org/W2128381560","https://openalex.org/W2130403046","https://openalex.org/W2136032111","https://openalex.org/W2142803923","https://openalex.org/W2145366761","https://openalex.org/W2155947520","https://openalex.org/W2171761395"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"Defending":[0],"against":[1,24,49,147],"attack":[2,31,44,81,98],"is":[3,143],"the":[4,34,43,97,123],"key":[5,184],"successful":[6],"factor":[7],"for":[8],"sensor":[9],"network":[10],"security.":[11],"There":[12],"are":[13,28,151],"many":[14],"approaches":[15],"that":[16,142,168],"can":[17,39,116,169],"be":[18],"used":[19],"to":[20,61,85,87,95,145],"detect":[21],"and":[22,46,52,75,107,121,174,183],"defend":[23,48,146],"attacks,":[25],"yet":[26],"few":[27],"focused":[29],"onmodeling":[30],"distribution.":[32],"Knowing":[33],"distribution":[35,82],"models":[36,92,111],"of":[37,80,100],"attacks":[38,148],"help":[40],"system":[41,113,118],"estimate":[42,96],"probability":[45,59,99,138],"thus":[47],"them":[50],"effectively":[51],"efficiently.":[53],"In":[54],"this":[55,156],"paper,":[56],"we":[57,134,158],"use":[58],"theory":[60],"develop":[62],"a":[63,67,104,136],"basic":[64,68],"uniform":[65,73],"model,":[66,70],"gradient":[69,78],"an":[71,76],"intelligent":[72,77],"model":[74,79],"in":[83,112,125],"order":[84],"adapt":[86],"different":[88],"application":[89],"environments.":[90],"These":[91],"allow":[93],"systems":[94,171],"each":[101],"node":[102],"under":[103],"given":[105],"position":[106],"time.":[108],"Applying":[109],"these":[110,132],"security":[114,119,128],"designs":[115],"improve":[117],"performance":[120],"decrease":[122],"overheads":[124],"nearly":[126],"every":[127],"area.":[129],"Based":[130],"on":[131],"models,":[133],"describe":[135],"novel":[137],"secure":[139,166],"routing":[140,167],"algorithm":[141],"effective":[144],"whether":[149],"they":[150],"detected":[152],"or":[153],"not.":[154],"Besides":[155],"application,":[157],"also":[159],"introduce":[160],"some":[161],"other":[162],"applications,":[163],"such":[164],"as":[165],"save":[170],"available":[172],"energy":[173],"resources":[175],"while":[176],"still":[177],"providing":[178],"enough":[179],"security,":[180],"detecting":[181],"attack,":[182],"management.":[185]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
