{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2654343","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2654343","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q2654343","kernelVersion":"v1","immutable":true,"modified":"2026-01-15T13:30:05Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q2654343","name":"Detecting Sybil attacks in wireless sensor networks using neighboring information","headline":"Detecting Sybil attacks in wireless sensor networks using neighboring information","description":"scientific article; zbMATH DE number 5658963","url":"https://portal.mardi4nfdi.de/entity/Q2654343","datePublished":"2010-01-15","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q733221"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2039538"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2654342"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q551683"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1016/J.COMNET.2009.07.013","url":"https://doi.org/10.1016/J.COMNET.2009.07.013"},"sameAs":["https://doi.org/10.1016/J.COMNET.2009.07.013"]},"provenance":{"prov:generatedAtTime":"2026-01-15T13:30:05Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}