{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:11Z","timestamp":1725564611618},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_52","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"344-349","source":"Crossref","is-referenced-by-count":1,"title":["Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"K.","family":"Gopalakrishnan","sequence":"first","affiliation":[]},{"given":"V.","family":"Rhymend Uthariaraj","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/313237.313248","volume-title":"2nd ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems","author":"X. Hong","year":"1999","unstructured":"Hong, X., Gerla, M., Pei, G., Chiang, C.: A Group Mobility Model for Ad Hoc Wireless Networks. In: 2nd ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems, pp. 53\u201360. ACM, Seattle (1999)"},{"key":"52_CR2","unstructured":"Johnson, D.B., Maltz, D.A., Broch, J.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet Draft, The Internet Engineering Task Force (1999)"},{"key":"52_CR3","first-page":"1377","volume-title":"18th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"B. Liang","year":"1999","unstructured":"Liang, B., Haas, Z.: Predictive Distance-Based Mobility Management for PCS Networks. In: 18th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1377\u20131384. IEEE Computer Society, New York (1999)"},{"key":"52_CR4","first-page":"255","volume-title":"6th International Conference on Mobile Computing and Networking","author":"S. Marti","year":"2000","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th International Conference on Mobile Computing and Networking, pp. 255\u2013265. ACM, Boston (2000)"},{"key":"52_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T. Camp","year":"2002","unstructured":"Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. J. Wireless Communication and Mobile Computing\u00a02, 483\u2013502 (2002)","journal-title":"J. Wireless Communication and Mobile Computing"},{"key":"52_CR6","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1145\/513800.513828","volume-title":"IEEE\/ACM Symposium on Mobile Ad Hoc Networking and Computing","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Boudec, J.Y.L.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: IEEE\/ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 226\u2013236. ACM, Lausanne (2002)"},{"key":"52_CR7","first-page":"107","volume-title":"6th Joint Working Conference on Communications and Multimedia Security","author":"P. Michiardi","year":"2002","unstructured":"Michiardi, P., Molva, R.: CORE: A COllaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. In: 6th Joint Working Conference on Communications and Multimedia Security, vol.\u00a0228, pp. 107\u2013121. Kluwer, Portoroz (2002)"},{"key":"52_CR8","unstructured":"Bansal, S., Baker, M.: Observation-based Cooperation Enforcement in Ad hoc Networks. Technical Report, Stanford University (2003)"},{"key":"52_CR9","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1016\/j.comcom.2005.10.032","volume":"29","author":"A.A. Pirzada","year":"2006","unstructured":"Pirzada, A.A., Datta, A., McDonald, C.: Incorporating trust and reputation in the DSR protocol for dependable routing. J. Computer Communications\u00a029, 2806\u20132821 (2006)","journal-title":"J. Computer Communications"},{"key":"52_CR10","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1016\/j.adhoc.2008.10.003","volume":"7","author":"C. Zouridaki","year":"2009","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. J. Ad Hoc Networks\u00a07, 1156\u20131168 (2009)","journal-title":"J. Ad Hoc Networks"},{"key":"52_CR11","first-page":"45","volume-title":"1st IEEE International Conference on Advanced Computing","author":"K. Gopalakrishnan","year":"2009","unstructured":"Gopalakrishnan, K., Rhymend Uthariaraj, V.: Scenario based Evaluation of the Impact of Misbehaving Nodes in Mobile Ad Hoc Networks. In: 1st IEEE International Conference on Advanced Computing, pp. 45\u201350. IEEE Computer Society, Chennai (2009)"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:05:31Z","timestamp":1619787931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_52","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}