{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:38:04Z","timestamp":1742996284404,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642039683"},{"type":"electronic","value":"9783642039690"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03969-0_46","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T12:36:34Z","timestamp":1250512594000},"page":"485-494","source":"Crossref","is-referenced-by-count":4,"title":["Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks"],"prefix":"10.1007","author":[{"given":"Fredric M.","family":"Ham","sequence":"first","affiliation":[]},{"given":"Eyosias Yoseph","family":"Imana","sequence":"additional","affiliation":[]},{"given":"Attila","family":"Ondi","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]},{"given":"William","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Reedy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Abdelhafez, M., Riley, G., Cole, R.G., Phamado, N.: Modeling and Simulations of TCP MANET Worms. In: 21st International Workshop on Principles of Advanced and Distributed Simulation (PADS 2007), pp. 123\u2013130 (2007)","DOI":"10.1109\/PADS.2007.25"},{"key":"46_CR2","unstructured":"TPOC: Ghosh, A.K.: Defense Against Cyber Attacks on Mobile ad hoc Network Systems (MANETs). In: BAA04-18 Proposer Information Pamphlet (PIP), Defense Advanced Research Projects Agency (DARPA) Advanced Technology Office (ATO) (April 2004)"},{"key":"46_CR3","volume-title":"Principles of Neurocomputing for Science and Engineering","author":"F.M. Ham","year":"2001","unstructured":"Ham, F.M., Kostanic, I.: Principles of Neurocomputing for Science and Engineering. McGraw-Hill, New York (2001)"},{"key":"46_CR4","unstructured":"Gordon, S., Howard, F.: Antivirus Software Testing for the new Millennium. In: 23rd National Information Systems security Conference (2000)"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the Sixth International Conference on Mobile Computeing and Networking, pp. 255\u2013265 (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile ad hoc Networks. In: 10th Euromicro Workshop and Parallel, Distributed and Network-Based Processing, pp. 403\u2013410 (2002)","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes\u2013Fairness in Dynamic ad-hoc Networks. In: Proceeding of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing, pp. 226\u2013236 (June 2002)","DOI":"10.1145\/513800.513828"},{"key":"46_CR8","first-page":"1510","volume":"3","author":"Y. Liu","year":"2003","unstructured":"Liu, Y., Yang, T.R.: Reputation Propagation and Agreement in Mobile Ad-Hoc Networks. IEEE Wireless Communication and Networking\u00a03, 1510\u20131515 (2003)","journal-title":"IEEE Wireless Communication and Networking"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Yi, L., Jian, L., Chang-xiang, S.: A New Computer Self-immune Model against Malicious Codes. In: First International Symposium on Data, Privacy and E-Commerce, pp. 456\u2013458 (2007)","DOI":"10.1109\/ISDPE.2007.97"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Samian, N., Maarof, M.A., Abd Razac, S.: Towards Identifying Features of Trust in Mobile Ad Hoc Networks. In: Second Asia International Conference on Modeling & Simulation, pp. 271\u2013276 (2008)","DOI":"10.1109\/AMS.2008.113"},{"key":"46_CR11","volume-title":"Detection of Signals in Noise","author":"R.N. McDonough","year":"1995","unstructured":"McDonough, R.N., Whalen, A.D.: Detection of Signals in Noise, 2nd edn. Academic Press, New York (1995)","edition":"2"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Balakrishnan, V., Varadharajan, V., Tupakula, U., Lucs, P.: TEAM: Trust Enhanced Security Architecture of Mobile Ad-hoc Networks. In: 15th IEEE International Conference on Networks, pp. 182\u2013187 (2007)","DOI":"10.1109\/ICON.2007.4444083"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y.: Application of Artificial Neural Networks Techniques to Computer Worm Detection. In: International Joint Conference on Neural Networks, pp. 2362\u20132369 (2006)","DOI":"10.1109\/IJCNN.2006.247059"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, 70\u201375 (October 2002)","DOI":"10.1109\/MCOM.2002.1039859"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03969-0_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:43:42Z","timestamp":1558475022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03969-0_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642039683","9783642039690"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03969-0_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}