{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:00:15Z","timestamp":1725559215010},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_86","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"1069-1082","source":"Crossref","is-referenced-by-count":3,"title":["RIDA: Robust Intrusion Detection in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Dhanant","family":"Subhadrabandhu","sequence":"first","affiliation":[]},{"given":"Saswati","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Farooq","family":"Anjum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","volume-title":"Hackers Beware","author":"E. Cole","year":"2001","unstructured":"Cole, E.: Hackers Beware. New Riding Publishing, Indianapolis (2001)"},{"key":"86_CR2","volume-title":"Firewalls and Internet Security","author":"W. Cheswic","year":"1999","unstructured":"Cheswic, W., Bellovin, W.: Firewalls and Internet Security. Addison Wesley, Reading (1999)"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, M., Zhang, L., Paxson, V.: Stream control transmission protocol. RFC 2960 (2000)","DOI":"10.17487\/rfc2960"},{"key":"86_CR4","doi-asserted-by":"crossref","unstructured":"Borisov, N., Ian Goldberg, D.W.: Intercepting mobile communications: The insecurity of 802.11. In: Proceedings of MOBICOM 2001 (2001)","DOI":"10.1145\/381677.381695"},{"key":"86_CR5","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. Denning","year":"2001","unstructured":"Denning, D.: An intrusion detection model. IEEE Transactions on Software Engineering\u00a0SE-13, 222\u2013232 (2001)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"86_CR6","volume-title":"Practical UNIX and Internet Security","author":"S. Garfinkel","year":"1996","unstructured":"Garfinkel, S., Spafford, G.: Practical UNIX and Internet Security, 2nd edn. O\u2019Reilly and Associates, Sebastopol (1996)","edition":"2"},{"key":"86_CR7","doi-asserted-by":"crossref","unstructured":"Ko, C., Brutch, P., Rowe, J., Tsafnat, G., Levitt, K.: System health and intrusion monitoring using a hierarchy of constraints. In: 4th International Symposium, Recent Advances in Intrusion Detection, pp. 190\u2013204 (2001)","DOI":"10.1007\/3-540-45474-8_12"},{"key":"86_CR8","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking (2000)","DOI":"10.1145\/345910.345955"},{"key":"86_CR9","doi-asserted-by":"crossref","unstructured":"Subhadrabandhu, D., Sarkar, S., Anjum, F.: Efficacy of misuse detection in adhoc networks. In: Proceedings of the IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON) (2004)","DOI":"10.1109\/SAHCN.2004.1381907"},{"key":"86_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the Sixth International Conference on Mobile Computing and Networking (MobiCom) (2000)","DOI":"10.1145\/345910.345958"},{"key":"86_CR11","unstructured":"Subhadrabandhu, D., Sarkar, S., Anjum, F.: Misuse detection with imperfect defenders in adhoc networks. Technical report, University of Pennsylvania Technical Report (2004), http:\/\/www.seas.upenn.edu\/~swati\/publication.htm"},{"key":"86_CR12","doi-asserted-by":"crossref","unstructured":"Ramanujan, R., Kudige, S., Nguyen, T., Takkella, S., Adelstein, F.: Intrusion-resistant ad hoc wireless networks. In: Proceedings of MILCOM (2002)","DOI":"10.1109\/MILCOM.2002.1179592"},{"key":"86_CR13","unstructured":"Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, an SNI Technical Report (1998), http:\/\/www.aciri.org\/vern\/Ptacek-Newsham-Evasion-98.ps"},{"key":"86_CR14","first-page":"52","volume":"24","author":"S. Dharmapurikar","year":"2004","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. Micro\u00a024, 52\u201361 (2004)","journal-title":"Micro"},{"key":"86_CR15","doi-asserted-by":"crossref","unstructured":"McHugh, J.: Intrusion and intrusion detection. International Journal of Information Security (2001)","DOI":"10.1007\/s102070100001"},{"key":"86_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2341-0","volume-title":"An Introduction to Signal Detection and Estimation","author":"H.V. Poor","year":"1994","unstructured":"Poor, H.V.: An Introduction to Signal Detection and Estimation, 2nd edn. Springer, Heidelberg (1994)","edition":"2"},{"key":"86_CR17","volume-title":"Computers and Intractability","author":"M.R. Garey","year":"2000","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability. W. H. Freeman and Company, New York (2000)"},{"key":"86_CR18","volume-title":"Approximation Algorithms","author":"V. Vazirani","year":"2001","unstructured":"Vazirani, V.: Approximation Algorithms. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:52:33Z","timestamp":1605642753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11422778_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}