An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Autor*in: |
Ngai, Edith C.H. [verfasserIn] |
---|
Format: |
Artikel |
---|
Erschienen: |
2007 |
---|
Umfang: |
12 |
---|
Übergeordnetes Werk: |
Enthalten in: Computer communications - Amsterdam : Elsevier, 1978, 30(2007), 11, Seite 2353-2364 |
---|---|
Übergeordnetes Werk: |
volume:30 ; year:2007 ; number:11 ; pages:2353-2364 ; extent:12 |
Katalog-ID: |
OLC1776533232 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC1776533232 | ||
003 | DE-627 | ||
005 | 20220216181136.0 | ||
007 | tu | ||
008 | 070828s2007 xx ||||| 00| ||und c | ||
028 | 5 | 2 | |a sw070828 |
035 | |a (DE-627)OLC1776533232 | ||
035 | |a (DE-599)GBVOLC1776533232 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
082 | 0 | 4 | |a 004 |
084 | |a 54.00 |2 bkl | ||
100 | 1 | |a Ngai, Edith C.H. |e verfasserin |4 aut | |
245 | 1 | 3 | |a An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
264 | 1 | |c 2007 | |
300 | |a 12 | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
700 | 1 | |a Liu, Jiangchuan |4 oth | |
700 | 1 | |a Lyu, Michael R. |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Computer communications |d Amsterdam : Elsevier, 1978 |g 30(2007), 11, Seite 2353-2364 |w (DE-627)13003973X |w (DE-600)429664-3 |w (DE-576)015581349 |x 0140-3664 |7 nnns |
773 | 1 | 8 | |g volume:30 |g year:2007 |g number:11 |g pages:2353-2364 |g extent:12 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-MKW | ||
912 | |a SSG-OLC-BUB | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_4247 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4324 | ||
936 | b | k | |a 54.00 |q AVZ |
951 | |a AR | ||
952 | |d 30 |j 2007 |e 11 |h 2353-2364 |g 12 |
author_variant |
e c n ec ecn |
---|---|
matchkey_str |
article:01403664:2007----::nfiinituedtcinloihaantikoetaki |
hierarchy_sort_str |
2007 |
bklnumber |
54.00 |
publishDate |
2007 |
allfields |
sw070828 (DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 DE-627 ger DE-627 rakwb 004 54.00 bkl Ngai, Edith C.H. verfasserin aut An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks 2007 12 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Liu, Jiangchuan oth Lyu, Michael R. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 30(2007), 11, Seite 2353-2364 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:30 year:2007 number:11 pages:2353-2364 extent:12 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 54.00 AVZ AR 30 2007 11 2353-2364 12 |
spelling |
sw070828 (DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 DE-627 ger DE-627 rakwb 004 54.00 bkl Ngai, Edith C.H. verfasserin aut An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks 2007 12 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Liu, Jiangchuan oth Lyu, Michael R. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 30(2007), 11, Seite 2353-2364 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:30 year:2007 number:11 pages:2353-2364 extent:12 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 54.00 AVZ AR 30 2007 11 2353-2364 12 |
allfields_unstemmed |
sw070828 (DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 DE-627 ger DE-627 rakwb 004 54.00 bkl Ngai, Edith C.H. verfasserin aut An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks 2007 12 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Liu, Jiangchuan oth Lyu, Michael R. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 30(2007), 11, Seite 2353-2364 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:30 year:2007 number:11 pages:2353-2364 extent:12 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 54.00 AVZ AR 30 2007 11 2353-2364 12 |
allfieldsGer |
sw070828 (DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 DE-627 ger DE-627 rakwb 004 54.00 bkl Ngai, Edith C.H. verfasserin aut An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks 2007 12 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Liu, Jiangchuan oth Lyu, Michael R. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 30(2007), 11, Seite 2353-2364 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:30 year:2007 number:11 pages:2353-2364 extent:12 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 54.00 AVZ AR 30 2007 11 2353-2364 12 |
allfieldsSound |
sw070828 (DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 DE-627 ger DE-627 rakwb 004 54.00 bkl Ngai, Edith C.H. verfasserin aut An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks 2007 12 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Liu, Jiangchuan oth Lyu, Michael R. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 30(2007), 11, Seite 2353-2364 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:30 year:2007 number:11 pages:2353-2364 extent:12 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 54.00 AVZ AR 30 2007 11 2353-2364 12 |
source |
Enthalten in Computer communications 30(2007), 11, Seite 2353-2364 volume:30 year:2007 number:11 pages:2353-2364 extent:12 |
sourceStr |
Enthalten in Computer communications 30(2007), 11, Seite 2353-2364 volume:30 year:2007 number:11 pages:2353-2364 extent:12 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer communications |
authorswithroles_txt_mv |
Ngai, Edith C.H. @@aut@@ Liu, Jiangchuan @@oth@@ Lyu, Michael R. @@oth@@ |
publishDateDaySort_date |
2007-01-01T00:00:00Z |
hierarchy_top_id |
13003973X |
dewey-sort |
14 |
id |
OLC1776533232 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1776533232</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216181136.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">070828s2007 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw070828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1776533232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1776533232</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ngai, Edith C.H.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">12</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Jiangchuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lyu, Michael R.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer communications</subfield><subfield code="d">Amsterdam : Elsevier, 1978</subfield><subfield code="g">30(2007), 11, Seite 2353-2364</subfield><subfield code="w">(DE-627)13003973X</subfield><subfield code="w">(DE-600)429664-3</subfield><subfield code="w">(DE-576)015581349</subfield><subfield code="x">0140-3664</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:30</subfield><subfield code="g">year:2007</subfield><subfield code="g">number:11</subfield><subfield code="g">pages:2353-2364</subfield><subfield code="g">extent:12</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">30</subfield><subfield code="j">2007</subfield><subfield code="e">11</subfield><subfield code="h">2353-2364</subfield><subfield code="g">12</subfield></datafield></record></collection>
|
author |
Ngai, Edith C.H. |
spellingShingle |
Ngai, Edith C.H. ddc 004 bkl 54.00 An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
authorStr |
Ngai, Edith C.H. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)13003973X |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0140-3664 |
topic_title |
004 54.00 bkl An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
topic |
ddc 004 bkl 54.00 |
topic_unstemmed |
ddc 004 bkl 54.00 |
topic_browse |
ddc 004 bkl 54.00 |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
j l jl m r l mr mrl |
hierarchy_parent_title |
Computer communications |
hierarchy_parent_id |
13003973X |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer communications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 |
title |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
ctrlnum |
(DE-627)OLC1776533232 (DE-599)GBVOLC1776533232 |
title_full |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
author_sort |
Ngai, Edith C.H. |
journal |
Computer communications |
journalStr |
Computer communications |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2007 |
contenttype_str_mv |
txt |
container_start_page |
2353 |
author_browse |
Ngai, Edith C.H. |
container_volume |
30 |
physical |
12 |
class |
004 54.00 bkl |
format_se |
Aufsätze |
author-letter |
Ngai, Edith C.H. |
dewey-full |
004 |
title_sort |
efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
title_auth |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_62 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_4247 GBV_ILN_4307 GBV_ILN_4324 |
container_issue |
11 |
title_short |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks |
remote_bool |
false |
author2 |
Liu, Jiangchuan Lyu, Michael R. |
author2Str |
Liu, Jiangchuan Lyu, Michael R. |
ppnlink |
13003973X |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
up_date |
2024-07-03T21:51:10.373Z |
_version_ |
1803596301989838848 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1776533232</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216181136.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">070828s2007 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw070828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1776533232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1776533232</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ngai, Edith C.H.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">12</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Jiangchuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lyu, Michael R.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer communications</subfield><subfield code="d">Amsterdam : Elsevier, 1978</subfield><subfield code="g">30(2007), 11, Seite 2353-2364</subfield><subfield code="w">(DE-627)13003973X</subfield><subfield code="w">(DE-600)429664-3</subfield><subfield code="w">(DE-576)015581349</subfield><subfield code="x">0140-3664</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:30</subfield><subfield code="g">year:2007</subfield><subfield code="g">number:11</subfield><subfield code="g">pages:2353-2364</subfield><subfield code="g">extent:12</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">30</subfield><subfield code="j">2007</subfield><subfield code="e">11</subfield><subfield code="h">2353-2364</subfield><subfield code="g">12</subfield></datafield></record></collection>
|
score |
7.401041 |