{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T16:59:31Z","timestamp":1772038771391,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"value":"9780387094892","type":"print"},{"value":"9780387094908","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09490-8_12","type":"book-chapter","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T09:21:58Z","timestamp":1219915318000},"page":"133-144","source":"Crossref","is-referenced-by-count":10,"title":["Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms"],"prefix":"10.1007","author":[{"given":"Aikaterini","family":"Mitrokotsa","sequence":"first","affiliation":[]},{"given":"Manolis","family":"Tsagkaris","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","first-page":"121","volume-title":"Knowledge Discovery and Data Mining","author":"C.J.C. Burges","year":"1998","unstructured":"Burges C.J.C.: A Tutorial on Support Vector Machines for Pattern Recognition. In: Knowledge Discovery and Data Mining, Vol. 2, pp. 121\u2013167, Springer-Verlag, London, UK (1998)."},{"key":"12_CR2","unstructured":"Deng H., Zeng Q., Agrawal D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC03), pp. 2147\u20132151. Orlando, Florida, USA (2003)."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Djenouri D., Mahmoudi O., Bouamama M., Llewellyn-Jones D., Merabti M.: On Securing MANET Routing Protocol Against Control Packet Dropping. In: Proceedings of IEEE International Conference on Pervasive Services (ICPS\u2032 07) pp. 100\u2013108, Istanbul, Turkey (2007).","DOI":"10.1109\/PERSER.2007.4283899"},{"key":"12_CR4","unstructured":"GloMoSim: Global Information Systems Simulation Library, Version 2.0 (2000)."},{"key":"12_CR5","unstructured":"Huang Y., Fan, W., Lee W., Yu P.: Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 478. Rhode Island, USA (2003)."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Huang Y., Lee W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), pp. 135\u2013147. Fairfax, VA, USA (2003).","DOI":"10.1145\/986858.986877"},{"key":"12_CR7","unstructured":"Lee W., Stolfo S.J., Mok K.W.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013132, Oakland, CA, (1999)."},{"key":"12_CR8","unstructured":"Liu Y., Li Y., Man H.: MAC Layer Anomaly Detection in Ad Hoc Networks. In: Proceedings of 6th IEEE Information Assurance Workshop. West Point, New York, USA (2005)."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Mitrokotsa A., Komninos N., Douligeris C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: Proceeding of IEEE International Conference on Pervasive Services 2007 (ICPS07), pp. 118\u2013127, Istanbul, Turkey (2007).","DOI":"10.1109\/PERSER.2007.4283901"},{"key":"12_CR10","unstructured":"Shurman M.AI, Yoo S.M., Park S.: Black Hole Attack in Wireless Ad Hoc Networks. In: Proceedings of ACM 42nd Southeast Conference (ACMSE 04), pp. 96\u201397, Alabama (2004)."},{"key":"12_CR11","unstructured":"Sun B.: Intrusion Detection in Mobile Ad Hoc Networks. Doctor of Philosophy, Computer Science, Texas A&M University (2004)."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ning, P.; Sun, K.: How to Misuse AODV: a Case Study of Insider Attacks Against Mobile Ad-hoc Routing Protocols. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, pp. 60\u201367, NY (2003).","DOI":"10.1109\/SMCSIA.2003.1232402"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/S1004-4132(06)60070-4","volume":"17","author":"P. Yi","year":"2006","unstructured":"Yi P., Hou Y.F., Zhong Y., Zhang S., Dai Z.: Flooding Attack and Defence in Ad hoc Networks. In: Systems Engineering and Electronics, Vol. 17, No. 2, pp. 410\u2013416 (2006).","journal-title":"Systems Engineering and Electronics"},{"issue":"5","key":"12_CR14","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"9","author":"Y. Zhang","year":"2003","unstructured":"Zhang Y., Lee W., Huang Y.: Intrusion Detection Techniques for Mobile Wireless Networks. In: Wireless Networks Vol. 9, No. 5, pp. 545\u2013556. (2003).","journal-title":"Wireless Networks"},{"key":"12_CR15","first-page":"1137","volume":"2","author":"R. Kohavi","year":"1995","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, Vol. 2, pp. 1137\u20131145 (1995).","journal-title":"Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence"}],"container-title":["IFIP International Federation for Information Processing","Advances in Ad Hoc Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09490-8_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:38:39Z","timestamp":1619573919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09490-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094892","9780387094908"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09490-8_12","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[]}}