{"_id":"msRx6sC8j9ZuLMGeb","bibbaseid":"ahmed-aseeri-kaiser-zenia-chowdhury-anovelalgorithmformaliciousattackdetectioninuwsn-2015","authorIDs":["gf8A6mX5LJkwXekmt"],"author_short":["Ahmed, M. R","Aseeri, M.","Kaiser, M S.","Zenia, N. Z","Chowdhury, Z. I"],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"A novel algorithm for malicious attack detection in uwsn","author":[{"propositions":[],"lastnames":["Ahmed"],"firstnames":["Muhammad","R"],"suffixes":[]},{"propositions":[],"lastnames":["Aseeri"],"firstnames":["Mohammed"],"suffixes":[]},{"propositions":[],"lastnames":["Kaiser"],"firstnames":["M","Shamim"],"suffixes":[]},{"propositions":[],"lastnames":["Zenia"],"firstnames":["Nusrat","Z"],"suffixes":[]},{"propositions":[],"lastnames":["Chowdhury"],"firstnames":["Zamshed","I"],"suffixes":[]}],"booktitle":"2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT)","pages":"1–6","year":"2015","organization":"IEEE","bibtex":"@inproceedings{ahmed2015novel,\n title={A novel algorithm for malicious attack detection in uwsn},\n author={Ahmed, Muhammad R and Aseeri, Mohammed and Kaiser, M Shamim and Zenia, Nusrat Z and Chowdhury, Zamshed I},\n booktitle={2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT)},\n pages={1--6},\n year={2015},\n organization={IEEE}\n}\n\n","author_short":["Ahmed, M. R","Aseeri, M.","Kaiser, M S.","Zenia, N. Z","Chowdhury, Z. I"],"key":"ahmed2015novel","id":"ahmed2015novel","bibbaseid":"ahmed-aseeri-kaiser-zenia-chowdhury-anovelalgorithmformaliciousattackdetectioninuwsn-2015","role":"author","urls":{},"metadata":{"authorlinks":{"kaiser, m":"https://bibbase.org/show?msg=embed&bib=https://dblp.org/pid/80/10014.bib"}},"downloads":0},"bibtype":"inproceedings","creationDate":"2021-02-19T18:00:08.640Z","downloads":0,"keywords":[],"search_terms":["novel","algorithm","malicious","attack","detection","uwsn","ahmed","aseeri","kaiser","zenia","chowdhury"],"title":"A novel algorithm for malicious attack detection in uwsn","year":2015,"biburl":"https://bibbase.org/network/files/Y3qXMnYoMtPnGq3yy","dataSources":["XxnyXEGfAxbBCrK23","3aAmSx3tgfhWcb5kG","3qYGLegypxxYXJRSz","p3TTjzqXMraRShudg","XA8vL2csAf3tB2MQH"]}