{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:37:55Z","timestamp":1743089875199,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105086"},{"type":"electronic","value":"9783319105093"}],"license":[{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10509-3_6","type":"book-chapter","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T23:45:02Z","timestamp":1411515902000},"page":"71-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Binh Hy","family":"Dang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,23]]},"reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433\u2013459 (2010)","journal-title":"Wiley Interdisc. Rev. Comput. Stat."},{"doi-asserted-by":"crossref","unstructured":"Alikhany, M., Abadi, M.: A dynamic clustering-based approach for anomaly detection in AODV-based MANETs. In: Proceedings of International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 67\u201372 (2011)","key":"6_CR2","DOI":"10.1109\/CNDS.2011.5764587"},{"unstructured":"Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, S. (eds.) Wireless\/Mobile Network Security, pp. 170\u2013196 (2006)","key":"6_CR3"},{"doi-asserted-by":"crossref","unstructured":"Avram, T., Oh, S., Hariri, S.: Analyzing attacks in wireless ad hoc network with self-organizing maps. In: Proceedings of the 5th Annual CCNSR, pp. 166\u2013175 (2007)","key":"6_CR4","DOI":"10.1109\/CNSR.2007.15"},{"doi-asserted-by":"crossref","unstructured":"Azer, M. A., El-Kansa, S. M., El-Soudani, M. S.: Security in ad hoc networks from vulnerability to risk management. In: IEEE 3rd International Conference on Emerging Security Information, Systems and Technologies, pp. 203\u2013209 (2009)","key":"6_CR5","DOI":"10.1109\/SECURWARE.2009.38"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"unstructured":"Gan, G.: Data Clustering in C++: an object-oriented approach. Chapman & Hall\/CRC, Boca Raton (2011)","key":"6_CR7"},{"issue":"3","key":"6_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31(3), 264\u2013323 (1999)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Li, W., Joshi, A.: Outlier detection in ad hoc networks using Dempster-Shafer theory. In: Proceedings of the 10th ICMDM, pp. 112\u2013121 (2009)","key":"6_CR9","DOI":"10.1109\/MDM.2009.22"},{"doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Tsagkaris, M., Douligeris, C.: Intrusion detection in mobile ad hoc networks using classification algorithms. In: Processing of IFIP International Federation for Information, Advances in Ad Hoc Networking, Vol. 265, pp. 133\u2013144 (2008)","key":"6_CR10","DOI":"10.1007\/978-0-387-09490-8_12"},{"issue":"5","key":"6_CR11","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1109\/TVT.2008.2010049","volume":"58","author":"H Nakayama","year":"2009","unstructured":"Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., Kato, N.: A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Trans. Veh. Technol. 58(5), 2471\u20132481 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1016\/j.adhoc.2004.04.001","volume":"3","author":"P Ning","year":"2005","unstructured":"Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Proc. Ad Hoc Netw. 3(6), 795\u2013819 (2005)","journal-title":"Proc. Ad Hoc Netw."},{"doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector routing. RFC 3561 (2003)","key":"6_CR13","DOI":"10.17487\/rfc3561"},{"unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM Workshop on Data Mining Applied to Security, pp. 1\u201314 (2001)","key":"6_CR14"},{"doi-asserted-by":"crossref","unstructured":"Sadoddin, R., Ghorbani, A.: A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. Machine Learning and Data Mining in Pattern Recognition. In: Perner, P. (ed.) Vol. 4571, pp. 404\u2013418 (2007)","key":"6_CR15","DOI":"10.1007\/978-3-540-73499-4_31"},{"unstructured":"Sun, B., Wu, K., Pooch, U.: Towards adaptive intrusion detection in mobile ad hoc networks. In: Proceedings of IEEE GLOBECOM, pp. 3551\u20133555 (2004)","key":"6_CR16"}],"container-title":["Studies in Computational Intelligence","Computer and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10509-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T02:38:53Z","timestamp":1675996733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10509-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,23]]},"ISBN":["9783319105086","9783319105093"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10509-3_6","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,23]]},"assertion":[{"value":"23 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}