{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:45:21Z","timestamp":1742996721530,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_39","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"345-352","source":"Crossref","is-referenced-by-count":2,"title":["AODV Based Black-Hole Attack Mitigation in MANET"],"prefix":"10.1007","author":[{"given":"Subhashis","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Mousumi","family":"Sardar","sequence":"additional","affiliation":[]},{"given":"Koushik","family":"Majumder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"H.L. Nguyen","year":"2008","unstructured":"Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks\u00a06(1), 32\u201346 (2008)","journal-title":"Ad Hoc Networks"},{"key":"39_CR2","unstructured":"Karmore, P., Bodkhe, S.: A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, IJCSE (2011)"},{"key":"39_CR3","unstructured":"Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET-Internet Communication. International Journal of Computer Science and Security, IJCSS\u00a04(3) (2010)"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, The Internet Engineering Task Force, Network Working Group (2003), \n                    http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on MOBICOM, Boston, Massachusetts, United States, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"issue":"7","key":"39_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.5120\/165-290","volume":"1","author":"S. Jain","year":"2010","unstructured":"Jain, S., Jain, M., Kandwal, H.: Advanced algorithm for detection and prevention of cooperative black and Grayhole attacks in mobile ad hoc networks. J. Computer Applications\u00a01(7), 37\u201342 (2010)","journal-title":"J. Computer Applications"},{"issue":"5","key":"39_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.5120\/2283-2959","volume":"18","author":"R. Shree","year":"2011","unstructured":"Shree, R., Dwivedi, S.K., Pandey, R.P.: Design Enhancements in ZRP for Detecting Multiple Blackhole Nodes in Mobile Ad Hoc Networks. International Journal of Computer Applications\u00a018(5), 6\u201310 (2011)","journal-title":"International Journal of Computer Applications"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.M., Park, S.: Blackhole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, ACM-SE\u201942, Huntsville, Alabama (April 2004)","DOI":"10.1145\/986537.986560"},{"key":"39_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-34135-9_37","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"S. Banerjee","year":"2012","unstructured":"Banerjee, S., Majumder, K.: A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 372\u2013384. Springer, Heidelberg (2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T15:59:46Z","timestamp":1681487986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}