{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:00:01Z","timestamp":1742918401983,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176036"},{"type":"electronic","value":"9783642176043"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17604-3_2","type":"book-chapter","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T01:55:30Z","timestamp":1290822930000},"page":"11-21","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Method for Detecting Misbehaving Zone Manager in MANET"],"prefix":"10.1007","author":[{"given":"Marjan Kuchaki","family":"Rafsanjani","sequence":"first","affiliation":[]},{"given":"Farzaneh","family":"Pakzad","sequence":"additional","affiliation":[]},{"given":"Sanaz","family":"Asadinia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"42","volume":"3","author":"H. Xiao","year":"2006","unstructured":"Xiao, H., Hong, F., Li, H.: Intrusion Detection in Ad hoc Networks. J. Commu. and Comput.\u00a03, 42\u201347 (2006)","journal-title":"J. Commu. and Comput."},{"key":"2_CR2","first-page":"1","volume-title":"4th IEEE\/IFIP International Conference on Internet","author":"A.F. Farhan","year":"2008","unstructured":"Farhan, A.F., Zulkhairi, D., Hatim, M.T.: Mobile Agent Intrusion Detection System for Mobile Ad hoc Networks: A Non-overlapping Zone Approach. In: 4th IEEE\/IFIP International Conference on Internet, pp. 1\u20135. IEEE Press, Tashkent (2008)"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/COMPSAC.2007.18","volume-title":"31st Annual International Computer Software and Applications Conferences (COMPSAC 2007)","author":"Y. Fu","year":"2007","unstructured":"Fu, Y., He, J., Li, G.: A Distributed Intrusion Detection Scheme for Mobile Ad hoc Networks. In: 31st Annual International Computer Software and Applications Conferences (COMPSAC 2007), vol.\u00a02, pp. 75\u201380. IEEE Press, Beijing (2007)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.adhoc.2007.04.003","volume":"6","author":"N. Marchang","year":"2008","unstructured":"Marchang, N., Datta, R.: Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks. J. Ad Hoc Networks\u00a06, 508\u2013523 (2008)","journal-title":"J. Ad Hoc Networks"},{"key":"2_CR5","first-page":"368","volume-title":"Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops)","author":"P. Brutch","year":"2003","unstructured":"Brutch, P., Ko, C.: Challenges in Intrusion Detection for Wireless Ad hoc Networks. In: Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), pp. 368\u2013373. IEEE Press, Florida (2003)"},{"key":"2_CR6","first-page":"255","volume-title":"6th Annual International Conference on Mobile Computing and Networking","author":"S. Marti","year":"2000","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: 6th Annual International Conference on Mobile Computing and Networking, pp. 255\u2013265. ACM, New York (2000)"},{"key":"2_CR7","unstructured":"Arifin, R.M.: A Study on Efficient Architecture for Intrusion Detection System in Ad hoc Networks. M.SC. Thesis, repository.dl.itc.u-okyo.ac.jp\/dspace\/bitstream\/2261\/..\/K-01476.pdf, pp. 1\u201353 (2008)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"9","author":"Y. Zhang","year":"2003","unstructured":"Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection Techniques for Mobile Wireless Networks. J. Wireless Networks\u00a09, 545\u2013556 (2003)","journal-title":"J. Wireless Networks"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/941311.941323","volume-title":"2nd ACM Workshop on Wireless Security (WiSe 2003)","author":"B. Sun","year":"2003","unstructured":"Sun, B., Wu, K., Pooch, U.W.: Alert Aggregation in Mobile Ad hoc Networks. In: 2nd ACM Workshop on Wireless Security (WiSe 2003), pp. 69\u201378. ACM, New York (2003)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-0-387-33112-6_7","volume-title":"Wireless\/Mobile Network Security","author":"T. Anantvalee","year":"2007","unstructured":"Anantvalee, T., Wu, J.: A Survey on Intrusion Detection in Mobile Ad hoc Networks. In: Xiao, Y., Shen, X., Du, D.Z. (eds.) Wireless\/Mobile Network Security, vol.\u00a02, pp. 159\u2013180. Springer, Heidelberg (2007)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/986858.986877","volume-title":"ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003)","author":"Y. Huang","year":"2003","unstructured":"Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad hoc Networks. In: ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), pp. 135\u2013147. ACM, New York (2003)"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1016\/j.adhoc.2007.11.004","volume":"6","author":"A. Razak","year":"2008","unstructured":"Razak, A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-Assisted Intrusion Detection and Response Mechanisms for Mobile Ad hoc Networks. J. Ad Hoc Networks\u00a06, 1151\u20131167 (2008)","journal-title":"J. Ad Hoc Networks"}],"container-title":["Communications in Computer and Information Science","Communication and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17604-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T08:53:52Z","timestamp":1553244832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17604-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176036","9783642176043"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17604-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}