{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:40:28Z","timestamp":1742395228243},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540397236"},{"type":"electronic","value":"9783540397250"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11856214_13","type":"book-chapter","created":{"date-parts":[[2006,9,16]],"date-time":"2006-09-16T07:12:21Z","timestamp":1158390741000},"page":"249-271","source":"Crossref","is-referenced-by-count":28,"title":["DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET"],"prefix":"10.1007","author":[{"given":"Chinyang Henry","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Shiau-Huey","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Calvin","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of IEEE ICNP (2002)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Zapata, M., Asokan, N.: Securing Ad hoc Routing Protocols (2002)","DOI":"10.1145\/570681.570682"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security-aware routing protocol for wireless ad hoc networks. In: Proceedings of ACM MobiHoc (October 2001)","DOI":"10.1145\/501416.501464"},{"issue":"13","key":"13_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"2","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R., Porras, P.: State Transition Analysis: A Rule-based Intrusion Detection Approach. IEEE Transactions of Software Engineering\u00a02(13), 181\u2013199 (1995)","journal-title":"IEEE Transactions of Software Engineering"},{"key":"13_CR5","unstructured":"Lindqvist, U., Porras, P.: Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In: Proceedings of the 1999 Symposium on Security and Privacy (May 1999)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Y.-a., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986877"},{"key":"13_CR7","unstructured":"Sterne, D., et al.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Information Assurance Workshop (2005)"},{"key":"13_CR8","unstructured":"Anjum, F., Talpade, R.R.: LiPad: Lightweight Packet Drop Detection for Ad Hoc Networks. In: Proceedings of the 2004 IEEE 60th Vehicular Technology Conference, Los Angeles (September 2004)"},{"key":"13_CR9","unstructured":"Rebahi, Y., Mujica, V., Simons, C., Sisalem, D.: SAFE: Securing pAcket Forwarding in ad hoc nEtworks. In: 5th Workshop on Applications and Services in Wireless Networks, Paris, France (June\/July, 2005)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)","DOI":"10.1145\/345910.345958"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-Based Intrusion Detection System For AODV. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986876"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: Proceedings of the IEEE Workshop on Security and Assurance in Ad Hoc Networks, Orlando, Florida (2003)","DOI":"10.1201\/9780203504086.ch21"},{"key":"13_CR13","unstructured":"Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., M\u00fchlethaler, P., Raffo, D.: Securing the OLSR Protocol. In: Med-Hoc-Net 2003, Mahdia, Tunisia (June 25-27, 2003)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/11663812_17","volume-title":"Recent Advances in Intrusion Detection","author":"C.H. Tseng","year":"2006","unstructured":"Tseng, C.H., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.N.: A Specification-Based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 330\u2013350. Springer, Heidelberg (2006)"},{"key":"13_CR15","unstructured":"Prasant, M., Srikanth, K.: Ad Hoc Networks: Technologies and Protocols"},{"key":"13_CR16","unstructured":"Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol. Formal Concept Analysis 3626"},{"key":"13_CR17","unstructured":"Johnson, D., Maltz, D.: Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing (1996)"},{"key":"13_CR18","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.: Ad Hoc On Demand Distance Vector (AODV) Routing. In: IETF RFC 3561"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., LaFlamme, D., Levine, B.N., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad Hoc Networks. Journal of Selected Areas of Communications (JSAC) Special Issue on Ad hoc Networks (March 2005)","DOI":"10.1109\/JSAC.2004.842547"},{"key":"13_CR20","unstructured":"Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30143-1_7","volume-title":"Recent Advances in Intrusion Detection","author":"Y.-a. Huang","year":"2004","unstructured":"Huang, Y.-a., Lee, W.: Attack Analysis and Detection for Ad Hoc Routing Protocols. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 125\u2013145. Springer, Heidelberg (2004)"},{"issue":"2","key":"13_CR22","first-page":"2","volume":"5","author":"R. Perrig","year":"2002","unstructured":"Perrig, R., Canetti, D., Tygar, Song, D.: The TESLA broadcast authentication protocol. Cryptobytes (RSA Laboratories, Summer\/Fall 2002)\u00a05(2), 2\u201313 (2002)","journal-title":"Cryptobytes (RSA Laboratories, Summer\/Fall 2002)"},{"key":"13_CR23","unstructured":"Wang, S.-H., Tseng, C., Ko, C., Levitt, K.: A General Automatic Response Model for MANET. In: Proceeding of First IEEE International Workshop on Next Generation Wireless Networks 2005 (IEEE WoNGeN 2005) (2005)"},{"key":"13_CR24","unstructured":"Ogier, R., Templin, F., Lewis, M.: Topology Broadcast based on Reverse-Path Forwarding. In: IETF RFC. 3684"},{"key":"13_CR25","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11856214_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:56:09Z","timestamp":1558288569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11856214_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540397236","9783540397250"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11856214_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}