{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:21Z","timestamp":1725978381466},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_38","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"382-392","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET"],"prefix":"10.1007","author":[{"given":"Najiya","family":"Sultana","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"4","key":"38_CR1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217\u2013241 (2012)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"38_CR2","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1049\/iet-net.2013.0065","volume":"3","author":"SK Bhoi","year":"2014","unstructured":"Bhoi, S.K., Khilar, P.M.: Vehicular communication: a survey. IET Netw. 3(3), 204\u2013217 (2014)","journal-title":"IET Netw."},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., La, K., Baker, M.: Mitigating routing misbehavior in a mobile ad-hoc environment. In: Proceedings of the 6th Annual ACM\/IEEE International Conference on Mobile Computing and Networking, pp. 255\u2013265, August 2000","DOI":"10.1145\/345910.345955"},{"issue":"1","key":"38_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2008.09.001","volume":"5","author":"J Bernsen","year":"2009","unstructured":"Bernsen, J., Manivannan, D.: Unicast routing protocols for vehicular ad hoc networks: a critical comparison and classification. Pervasive Mob. Comput. 5(1), 1\u201318 (2009)","journal-title":"Pervasive Mob. Comput."},{"key":"38_CR5","unstructured":"Kumar, R., Dave, M.: A comparative study of various routing protocols in VANET, CoRR, vol. abs\/1108.2094 (2011)"},{"issue":"2","key":"38_CR6","doi-asserted-by":"publisher","first-page":"130","DOI":"10.4304\/jcm.5.2.130-143","volume":"5","author":"M Zhang","year":"2010","unstructured":"Zhang, M., Wolff, R.S.: A border node based routing protocol for partially connected vehicular ad hoc networks. J. Commun. 5(2), 130\u2013143 (2010)","journal-title":"J. Commun."},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Hoang Hai, T., Huh, E.-N.: Optimal selection and activation of intrusion detection agents for wireless sensor networks. In: Proceedings of the Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 350\u2013355, 6\u20138 December 2007","DOI":"10.1109\/FGCN.2007.175"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Fitaci, S.M., Jaffres-Runser, K., Comaniciu, C.: On modeling energy-security trade-offs for distributed monitoring in wireless ad hoc networks. In: Proceedings of the Military Communications Conference, MILCOM 2008, pp. 1\u20137. IEEE, 16\u201319 November 2008","DOI":"10.1109\/MILCOM.2008.4753166"},{"issue":"6","key":"38_CR9","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TC.2012.67","volume":"62","author":"RG Clegg","year":"2013","unstructured":"Clegg, R.G., Clayman, S., Pavlou, G., Mamatas, L., Galis, A.: On the selection of management\/monitoring nodes in highly dynamic networks. IEEE Trans. Comput. 62(6), 1207\u20131220 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"38_CR10","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/TPDS.2010.72","volume":"22","author":"D Dong","year":"2011","unstructured":"Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514\u2013527 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: SLAM: sleep-wake aware local monitoring in sensor networks. In: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 565\u2013574 (2007)","DOI":"10.1109\/DSN.2007.88"},{"issue":"2","key":"38_CR12","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/TW.2013.123013.130829","volume":"13","author":"R Zheng","year":"2014","unstructured":"Zheng, R., Le, T., Han, Z.: Approximate online learning algorithms for optimal monitoring in multi-channel wireless networks. IEEE Trans. Wirel. Commun. 13(2), 1023\u20131033 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"38_CR13","unstructured":"Tsikoudis, N., Papadogiannakis, A., Markatos, E.P.: LEoNIDS: a low-latency and energy-efficient network-level intrusion detection system. IEEE Trans. Emerg. Top. Comput. PP(99) (2014)"},{"issue":"3","key":"38_CR14","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1109\/TII.2015.2425142","volume":"11","author":"R Muradore","year":"2015","unstructured":"Muradore, R., Quaglia, D.: Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans. Ind. Inform. 11(3), 830\u2013840 (2015)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: Proceedings of the 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 4510\u20134513, 8\u201310 August 2011","DOI":"10.1109\/AIMSEC.2011.6010481"},{"key":"38_CR16","unstructured":"Afgah, A., Das, S.K., Basu, K.: A non-cooperative game approach for intrusion detection in sensor networks. In: Proceedings of the VTC 2004, Fall 2004"},{"key":"38_CR17","unstructured":"Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Y., Man, H., Comaniciu, C.: A game theoretic approach to efficient mixed strategies for intrusion detection. In: Proceedings of the IEEE International Conference on Communications (ICC 2006) (2006)","DOI":"10.1109\/ICC.2006.255097"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T03:53:32Z","timestamp":1571370812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}