{"id":81,"date":"2010-07-30T10:39:45","date_gmt":"2010-07-30T14:39:45","guid":{"rendered":"http:\/\/www.eg.bucknell.edu\/~perrone\/wordpress\/?page_id=81"},"modified":"2010-07-30T10:39:57","modified_gmt":"2010-07-30T14:39:57","slug":"ieee-security-privacy-2007","status":"publish","type":"page","link":"https:\/\/www.eg.bucknell.edu\/~perrone\/ieee-security-privacy-2007\/","title":{"rendered":"IEEE Security &#038; Privacy 2007"},"content":{"rendered":"<pre>\r\n@article{Perrone:07, \r\nauthor={Perrone, L. Felipe}, \r\njournal={IEEE Security \\& Privacy}, \r\ntitle={Could a Caveman Do It? The Surprising Potential \r\nof Simple Attacks}, \r\nyear={2007}, \r\nmonth={Nov.-Dec. }, \r\nvolume={5}, \r\nnumber={6}, \r\npages={74 -77}, \r\nkeywords={computational tool;mission-critical system;\r\nmobile computing device;network attack modeling;network\r\nperformance;network security;radio frequency technology;routing\r\nprotocol;wireless ad hoc network;ad hoc networks;mobile\r\ncomputing;mobile radio;performance evaluation;radiofrequency\r\nidentification;routing protocols;security of data;telecommunication security;},\r\ndoi={10.1109\/MSP.2007.162},\r\nissn={1540-7993}\r\n}\r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>@article{Perrone:07, author={Perrone, L. Felipe}, journal={IEEE Security \\&#038; Privacy}, title={Could a Caveman Do It? The Surprising Potential of Simple Attacks}, year={2007}, month={Nov.-Dec. }, volume={5}, number={6}, pages={74 -77}, keywords={computational tool;mission-critical system; mobile computing device;network attack modeling;network performance;network security;radio frequency technology;routing protocol;wireless ad hoc network;ad hoc networks;mobile computing;mobile radio;performance evaluation;radiofrequency identification;routing protocols;security of data;telecommunication security;}, doi={10.1109\/MSP.2007.162}, issn={1540-7993} }<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-81","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/pages\/81"}],"collection":[{"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":2,"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/pages\/81\/revisions"}],"predecessor-version":[{"id":83,"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/pages\/81\/revisions\/83"}],"wp:attachment":[{"href":"https:\/\/www.eg.bucknell.edu\/~perrone\/wp-json\/wp\/v2\/media?parent=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}