{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:12:20Z","timestamp":1743048740245,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076911"},{"type":"electronic","value":"9783319076928"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07692-8_12","type":"book-chapter","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T16:19:57Z","timestamp":1401380397000},"page":"121-131","source":"Crossref","is-referenced-by-count":3,"title":["An Artificial Intelligence Technique for Prevent Black Hole Attacks in MANET"],"prefix":"10.1007","author":[{"given":"Khalil I.","family":"Ghathwan","sequence":"first","affiliation":[]},{"given":"Abdul Razak B.","family":"Yaakub","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-1-4","volume":"1","author":"F.-H. Tseng","year":"2011","unstructured":"Tseng, F.-H., Li-Der, C., Han-Chieh, C.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Computing and Information Sciences\u00a01(1), 1\u201316 (2011)","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"11","key":"12_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/COM-M.2006.248156","volume":"44","author":"J.L. Burbank","year":"2006","unstructured":"Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.: Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology. IEEE Communications Magazine\u00a044(11), 39\u201345 (2006), doi:10.1109\/COM-M.2006.248156","journal-title":"IEEE Communications Magazine"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.: Ad hoc on demand distance vector Routing. In: Proceeding of the second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"12_CR4","volume-title":"Heuristic Search: Theory and applications","author":"S. Edelkamp","year":"2012","unstructured":"Edelkamp, S., Schrodl, S.: Heuristic Search: Theory and applications. Morgan Kaufmann Publishers, Elsevier, USA (2012)"},{"key":"12_CR5","volume-title":"Theory of Nets: Flows in Networks","author":"W.K. Chen","year":"1990","unstructured":"Chen, W.K.: Theory of Nets: Flows in Networks. A Wiley-Interscience Publication, USA (1990)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Tamilselvan, L., Sankaranarayanan, V.: Prevention of Co-operative Black Hole Attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless, pp. 21\u201326 (2008)","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"issue":"3","key":"12_CR7","first-page":"338","volume":"5","author":"S. Kurosawa","year":"2007","unstructured":"Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, N., Nemoto, Y.: Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security\u00a05(3), 338\u2013346 (2007)","journal-title":"International Journal of Network Security"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, X.Y., Sekiya, Y., Wakahara, Y.: Proposal of a method todetect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, ISADS 2009, vol.\u00a01(6), pp. 23\u201325 (2009), doi:10.1109\/ISADS.2009.5207339","DOI":"10.1109\/ISADS.2009.5207339"},{"key":"12_CR9","unstructured":"Zhang, X.Y., Lee, W.: Intrusion Detection In Wireless Ad-Hoc Networks. In: Proceeding of Mobicom Conference, pp. 275\u2013283 (2000), doi:10. 1145\/345910.345958"},{"key":"12_CR10","unstructured":"Ns2 network simulation tools, \n                    http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07692-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:27:44Z","timestamp":1676867264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07692-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076911","9783319076928"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07692-8_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}