{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:17:23Z","timestamp":1738387043701,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692942"},{"type":"electronic","value":"9783540692959"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69295-9_13","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T06:38:25Z","timestamp":1217486305000},"page":"134-148","source":"Crossref","is-referenced-by-count":1,"title":["SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Zhengxin","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Furong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Wei, D.: Research on Intrusion Detection in Ad Hoc Network, PHD thesis, College of Automation ChongQin University, 5 (2006)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"5","author":"Y. Zhang","year":"2003","unstructured":"Zhang, Y., Lee, W., Huang, Y.: Intrusion detection technqiues for mobile wireless networks. ACM Wireless Networks\u00a05, 545\u2013556 (2003)","journal-title":"ACM Wireless Networks"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Fei, W., Yijun, M., Benxiong, H.: COSR: Cooperative On-Demand Secure Route Protocol in MANET. In: Proceedings of ISCIT 2006, pp. 890\u2013893 (2006)","DOI":"10.1109\/ISCIT.2006.339865"},{"key":"13_CR4","unstructured":"Guerrero, M.: Securing ad hoc routing protocols. IETF Internet Draft, 06 (2006)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Seung, Y., Prasad, N., Robin, K.: Security-aware ad hoc routing for wireless networks. In: Proceedings of MobiHoc 2001, pp. 299\u2013302 (2001)","DOI":"10.1145\/501416.501464"},{"issue":"1-2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"H. Yih-Chun","year":"2005","unstructured":"Yih-Chun, H., Adrian, P., Johnson David, B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks\u00a011(1-2), 21\u201338 (2005)","journal-title":"Wireless Networks"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Commun. Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: ACM MOBICOM, pp. 202\u2013215 (2004)","DOI":"10.1145\/1023720.1023741"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Lee, S.J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: Proceedings of the IEEE ICC, pp. 3201\u20133205 (2001)","DOI":"10.1109\/ICC.2001.937262"},{"key":"13_CR10","unstructured":"Nasipuri,, Das, S.R.: On-Demand Multipath Routing for Mobile Ad Hoc Networks. In: Proceedings of IC3N (1999)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Ye, Z., Krishnamurthy, S.V., Tripathi, S.K.: A Framework for Reliable Routing in Mobile Ad Hoc Networks. In: IEEE INFOCOM (2003)","DOI":"10.1109\/INFCOM.2003.1208679"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Marina, M.K., Das, S.R.: On-demand Multipath Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP) (2001)","DOI":"10.1109\/ICNP.2001.992756"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Wang, F., Huang, C., Zhao, J., Rong, C.: IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. In: Proceeding of The IEEE 22nd International Conference on Advanced Information Networking and Applications, AINA 2008 (2008)","DOI":"10.1109\/AINA.2008.124"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Goyal., D., Caffery Jr., J.: Partitioning Avoidance in Mobile Ad hoc Networks Using Network Survivability. In: Proceedings ISCC 2002, pp. 553\u2013558 (2002)","DOI":"10.1109\/ISCC.2002.1021729"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69295-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T07:27:07Z","timestamp":1738308427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69295-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692942","9783540692959"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69295-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}