{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:27:52Z","timestamp":1725470872512},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457763"},{"type":"electronic","value":"9783540462330"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876601_26","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T14:46:45Z","timestamp":1159282005000},"page":"253-262","source":"Crossref","is-referenced-by-count":5,"title":["Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Il-Yong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Yoo-Sung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ki-Chang","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networks (MobiCom), Boston, USA (2000)","DOI":"10.1145\/345910.345958"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.-Y., Bowen, T., Levitt, K., Rowe, J.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the third IEEE International Workshop on Information Assurance (IWIA), College Park, MD, USA (2005)","DOI":"10.1109\/IWIA.2005.1"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proceedings of the 36th Hawaii International Conference on System Science (HICSS), Hawaii (2003)","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), Fairfax, VA, USA (2003)","DOI":"10.1145\/986858.986877"},{"key":"26_CR5","unstructured":"GloMoSim Simulator\u2019s web site, http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Brutch, P., Ko, C.: Challenges in Intrusion Detection for Wireless Ad-hoc Networks. In: 2003 Symposium on Applications and the Internet Workshops (SAINT), Orlando, Florida, USA (2003)","DOI":"10.1109\/SAINTW.2003.1210188"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Barker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of 6th International Conference on Mobile Computing and Networking (MobiCom), Boston, USA (2000)","DOI":"10.1145\/345910.345955"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Chatterjee, M., Das, S.K., Turgut, D.: WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks. Journal of Cluster Computing\u00a05(2) (2002)","DOI":"10.1023\/A:1013941929408"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Zhou, L., Hass, L.J.: Securing ad hoc networks. IEEE Networks\u00a013(6) (1999)","DOI":"10.1109\/65.806983"},{"key":"26_CR10","unstructured":"Li., Y., Wei, J.: Guidelines on Selecting Intrusion Detection Methods in MANET. In: The Proceedings of ISECON 2004, Newport (2004)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Bechler, M., Hof, H.-J., Kraft, D., P\u00e4hlke, F., Wolf, L.: A Cluster-Based Security Architecture of Ad Hoc Networks. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Hong Kong, China (2004)","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"26_CR12","volume-title":"Ad Hoc Mobile Wireless Networks: Protocols and Systems","author":"C.-K. Toh","year":"2002","unstructured":"Toh, C.-K.: Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall PTR, Englewood Cliffs (2002)"}],"container-title":["Lecture Notes in Computer Science","Management of Convergence Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876601_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:51Z","timestamp":1605642531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876601_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457763","9783540462330"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11876601_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}