{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:06:40Z","timestamp":1743026800038,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031440830"},{"type":"electronic","value":"9783031440847"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44084-7_15","type":"book-chapter","created":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:02:09Z","timestamp":1695459729000},"page":"148-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing the MANET by Detecting the Flooding Attacks Using Hybrid CNN-Bi-LSTM-RF Model"],"prefix":"10.1007","author":[{"given":"B. Deena Divya","family":"Nayomi","sequence":"first","affiliation":[]},{"given":"L. Venkata","family":"Jayanth","sequence":"additional","affiliation":[]},{"given":"A.","family":"Vinay","sequence":"additional","affiliation":[]},{"given":"P. Subba","family":"Rao","sequence":"additional","affiliation":[]},{"given":"L. Shashi","family":"Vardhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Sbai, O., El boukhari, M.: September. Data flooding intrusion detection system for manets using deep learning approach. In: Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications, pp. 1\u20135 (2020)","DOI":"10.1145\/3419604.3419777"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s12652-021-03298-3","volume":"14","author":"R Vatambeti","year":"2023","unstructured":"Vatambeti, R., Sanshi, S., Krishna, D.P.: An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. J Ambient Intell Human Comput 14, 305\u2013319 (2023). https:\/\/doi.org\/10.1007\/s12652-021-03298-3","journal-title":"J Ambient Intell Human Comput"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Nandi, M., Anusha, K.: An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment. Wireless Personal Communications, pp.1\u201319 (2021)","DOI":"10.21203\/rs.3.rs-586844\/v1"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Archana, H.P., Khushi, C., Nandini, P., Sivaraman, E., Honnavalli, P.: Cloud-based Network Intrusion Detection System using Deep Learning. ArabWIC 2021: The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in Research, Sharjah, UAE (2021). https:\/\/doi.org\/10.1145\/3485557.3485562","DOI":"10.1145\/3485557.3485562"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Banerjee, B., Neogy, S.: A brief overview of security attacks and protocols in MANET. In: 2021 IEEE 18th India Council International Conference (INDICON), pp. 1\u20136. IEEE (2021, December)","DOI":"10.1109\/INDICON52576.2021.9691554"},{"key":"15_CR6","first-page":"8385","volume":"7","author":"S Kalime","year":"2021","unstructured":"Kalime, S., Sagar, K.: A review: secure routing protocols for mobile adhoc networks (MANETs). Journal of Critical Reviews 7, 8385\u20138393 (2021)","journal-title":"Journal of Critical Reviews"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Kothai, G., et al.: A new hybrid deep learning algorithm for prediction of wide traffic congestion in smart cities. Wireless Communications and Mobile Computing, vol. 2021, Article ID 5583874, pp. 13 (2021). https:\/\/doi.org\/10.1155\/2021\/5583874","DOI":"10.1155\/2021\/5583874"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Abdelhaq, M., et al.: The resistance of routing protocols against DDOS attack in MANET. Int. J. Electr. Comp. Eng. (2088\u20138708) 10(5) (2020)","DOI":"10.11591\/ijece.v10i5.pp4844-4852"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Fiade, A., Triadi, A.Y., Sulhi, A., Masruroh, S.U., Handayani, V., Suseno, H.B.: Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (vehicular ad-hoc network). In: 2020 8th International conference on cyber and IT service management (CITSM), pp. 1\u20135. IEEE (2020, October)","DOI":"10.1109\/CITSM50537.2020.9268789"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s11277-021-08717-4","volume":"127","author":"NS Divya","year":"2022","unstructured":"Divya, N.S., Bobba, V., Vatambeti, R.: An adaptive cluster based vehicular routing protocol for secure communication. Wireless Pers Commun 127, 1717\u20131736 (2022). https:\/\/doi.org\/10.1007\/s11277-021-08717-4","journal-title":"Wireless Pers Commun"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.comcom.2020.03.031","volume":"163","author":"TAS Srinivas","year":"2020","unstructured":"Srinivas, T.A.S., Manivannan, S.S.: Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput. Commun. 163, 162\u2013175 (2020)","journal-title":"Comput. Commun."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Zafar, S.: DDoS attacks impact on data transfer in IOT-MANET-based E-Healthcare for Tackling COVID-19. In: Data Analytics and Management: Proceedings of ICDAM, pp. 301\u2013309. Springer Singapore (2021)","DOI":"10.1007\/978-981-15-8335-3_24"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/JSYST.2020.2984797","volume":"15","author":"N Nishanth","year":"2020","unstructured":"Nishanth, N., Mujeeb, A.: Modeling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference. IEEE Syst. J. 15(1), 17\u201326 (2020)","journal-title":"IEEE Syst. J."},{"issue":"5","key":"15_CR14","first-page":"619","volume":"8","author":"S Kurian","year":"2021","unstructured":"Kurian, S., Ramasamy, L.: Securing service discovery from denial of service attack in mobile ad hoc network (MANET). Int. J. Comp. Netw. Appli. 8(5), 619\u2013633 (2021)","journal-title":"Int. J. Comp. Netw. Appli."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Gebremariam, G.G., Panda, J., Indu, S.: Localization and Detection of multiple attacks in wireless sensor networks using artificial neural network. Wireless Communications and Mobile Computing (2023)","DOI":"10.21203\/rs.3.rs-931986\/v1"},{"issue":"6","key":"15_CR16","doi-asserted-by":"publisher","first-page":"3828","DOI":"10.3390\/app13063828","volume":"13","author":"H Elubeyd","year":"2023","unstructured":"Elubeyd, H., Yiltas-Kaplan, D.: Hybrid deep learning approach for automatic Dos\/DDoS attacks detection in software-defined networks. Appl. Sci. 13(6), 3828 (2023)","journal-title":"Appl. Sci."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Meddeb, R., Jemili, F., Triki, B., Korbaa, O.: A Deep Learning based Intrusion Detection Approach for MANET (2022)","DOI":"10.21203\/rs.3.rs-1349334\/v1"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Tekleselassie, H.: Two-dimensional projection based wireless intrusion classification using lightweight EfficientNet. J. Cyber Sec. Mobi. 601\u2013620 (2022)","DOI":"10.13052\/jcsm2245-1439.1145"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Kishen Ajay Kumar, V., et al.: Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks. Journal of Mathematics vol. 2022, Article ID 3806018, 10 (2022). https:\/\/doi.org\/10.1155\/2022\/3806018","DOI":"10.1155\/2022\/3806018"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Ramana, K., et al.: Leaf disease classification in smart agriculture using deep neural network architecture and IoT. J. Circ. Sys. Comp. 31(15), 2240004 (2022). https:\/\/doi.org\/10.1142\/S0218126622400047","DOI":"10.1142\/S0218126622400047"},{"key":"15_CR21","unstructured":"Dwaram, J.R., Madapuri, R.K.: Crop yield forecasting by long short\u2010term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India"},{"issue":"4","key":"15_CR22","doi-asserted-by":"publisher","first-page":"3922","DOI":"10.1109\/TITS.2022.3233801","volume":"24","author":"K Ramana","year":"2023","unstructured":"Ramana, K., et al.: A vision transformer approach for traffic congestion prediction in urban areas. IEEE Trans. Intell. Transp. Syst. 24(4), 3922\u20133934 (2023). https:\/\/doi.org\/10.1109\/TITS.2022.3233801. April","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.53106\/160792642023012401003","volume":"24","author":"CM Nalayini","year":"2023","unstructured":"Nalayini, C.M., Katiravan, J.: A New IDS for Detecting DDoS Attacks in Wireless Networks using Spotted Hyena Optimization and Fuzzy Temporal CNN. Journal of Internet Technology 24(1), 23\u201334 (2023)","journal-title":"Journal of Internet Technology"}],"container-title":["Lecture Notes in Computer Science","Mining Intelligence and Knowledge Exploration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44084-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:04:06Z","timestamp":1695459846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44084-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031440830","9783031440847"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44084-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mining Intelligence and Knowledge Exploration","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kristiansand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mike2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mike.org.in\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}