{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:42:35Z","timestamp":1725518555408},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705598"},{"type":"electronic","value":"9783540705604"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70560-4_12","type":"book-chapter","created":{"date-parts":[[2008,9,9]],"date-time":"2008-09-09T09:16:32Z","timestamp":1220951792000},"page":"137-149","source":"Crossref","is-referenced-by-count":1,"title":["A Security Supervision System for Hybrid Networks"],"prefix":"10.1007","author":[{"given":"Francoise","family":"Sailhan","sequence":"first","affiliation":[]},{"given":"Julien","family":"Bourgeois","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"Wireless\/Mobile Network Security","author":"T. Anantvalee","year":"2008","unstructured":"Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless\/Mobile Network Security. Springer, Heidelberg (2008)"},{"key":"12_CR2","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University (2000)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Bhattacharje, B., Kommareddy, C.: Scalable application layer multicast. In: ACM SIGCOMM (2002)","DOI":"10.1145\/633025.633045"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"CLausen, T., Jacquet, P.: Optimized link state routing protocol (olsr), rfc 3626 (October 2003), http:\/\/www.ietf.org","DOI":"10.17487\/rfc3626"},{"key":"12_CR5","unstructured":"Clausen, T., Jacquet, P., Laouti, A., Muhlethaler, P., Quayyum, A., Viennot, L.: Optimized link state routing protocol. In: IEEE INMIC (2001)"},{"key":"12_CR6","unstructured":"Ganame, A.K., Bidoud, R., Bourgeois, J., Pies, F.: A high performance system for intrusion detection and reaction management. Journal of Information Assurance and Security (2006)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Ganame, A.K., Bourgeois, J., Bidou, R., et al.: A global security architecture for intrusion detection on computer networks. In: IEEE IPDPS (2007)","DOI":"10.1109\/IPDPS.2007.370621"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"V. Pacheco","year":"2007","unstructured":"Pacheco, V., Puttini, R.: An administration structure for the olsr protocol. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol.\u00a04707. Springer, Heidelberg (2007)"},{"key":"12_CR9","unstructured":"Albers, P., Camp, O., Percher, J.M., et al.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Wireless Information Systems (2002)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Sailhan, F., Fallon, L., Quinn, K., et al.: Wireless mesh network monitoring: Design, implementation and experiments. In: IEEE GLOBECOM-DANMS (2007)","DOI":"10.1109\/GLOCOMW.2007.4437816"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Sailhan, F., Issarny, V.: Scalable service discovery for manets. In: IEEE PERCOM (2005)","DOI":"10.1109\/PERCOM.2005.36"},{"key":"12_CR12","volume-title":"Wireless\/Mobile Network Security","author":"B. Wu","year":"2008","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless\/Mobile Network Security. Springer, Heidelberg (2008)"}],"container-title":["Studies in Computational Intelligence","Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70560-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:07:48Z","timestamp":1605762468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70560-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540705598","9783540705604"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70560-4_12","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}