{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:32:56Z","timestamp":1725593576976},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222023"},{"type":"electronic","value":"9783642222030"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22203-0_30","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T20:26:28Z","timestamp":1309206388000},"page":"336-341","source":"Crossref","is-referenced-by-count":6,"title":["An Algorithm to Detect Attacks in Mobile Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Radhika","family":"Saini","sequence":"first","affiliation":[]},{"given":"Manju","family":"Khari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Siva Ram Murthy, C., Manoj, B.S.: Mobile Ad Hoc Networks-Architecture and Protocols. Pearson Education, London (2004), ISBN 81-317-0688-5"},{"key":"30_CR2","unstructured":"Perkin, C.E.: Ad Hoc Networking. Pearson Education, London (January 2001)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Sheikhl, R., Chandee, M., Mishra, D.: Security Issues in MANET: A Review. IEEE (2010)","DOI":"10.1109\/WOCN.2010.5587317"},{"key":"30_CR4","unstructured":"Rai, P., Singh, S.: A Review of MANETs Security Aspects and Challenges. IJCA Special Issue on Mobile Ad Hoc Networks (2010)"},{"key":"30_CR5","volume-title":"A Survey of Attacks and Preventions in Mobile Ad Hoc Networks, Wireless\/Mobile Network Security","author":"B. Wu","year":"2006","unstructured":"Wu, B., et al.: A Survey of Attacks and Preventions in Mobile Ad Hoc Networks, Wireless\/Mobile Network Security, vol.\u00a017. Springer, Heidelberg (2006)"},{"key":"30_CR6","unstructured":"Jangra, A., Goel, N., Priyanka, Bhati, K.: Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture. International Journal of Electronics Engineering, 189\u2013196 (2010)"},{"issue":"2","key":"30_CR7","first-page":"305","volume":"2","author":"S. Sahu","year":"2010","unstructured":"Sahu, S., Shandilya, S.K.: A Comprehensive Survey On Intrusion Detection In Manet. International Journal of Information Technology and Knowledge Management\u00a02(2), 305\u2013310 (2010)","journal-title":"International Journal of Information Technology and Knowledge Management"},{"key":"30_CR8","unstructured":"Panos, C., Xenakis, C., Stavrakakis, I.: IEEE Fellow - A Novel Intrusion Detection System for MANETs (2009)"},{"key":"30_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/RAWCON.2003.1227896","volume-title":"Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks","author":"A. Patcha","year":"2003","unstructured":"Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. IEEE, Los Alamitos (2003)"},{"issue":"5","key":"30_CR10","first-page":"1793","volume":"2","author":"G. Mamatha","year":"2010","unstructured":"Mamatha, G., Sharma, S.: A Highly Secured Approach against Attacks in MANETS. International Journal of Computer Theory and Engineering\u00a02(5), 1793\u20138201 (2010)","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"30_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2007.4445917","volume-title":"A Secure Routing Mechanism in AODV for Ad Hoc Networks","author":"L. Jinghua","year":"2007","unstructured":"Jinghua, L., Peng, G., Yingqiang, Q., Gui, F.: A Secure Routing Mechanism in AODV for Ad Hoc Networks. IEEE, Los Alamitos (2007)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Jaisankar, N., Swamy, K.D.: A Novel Security Framework for Protecting Network Layer Operations in MANETs. International Journal of Engineering and Technology\u00a01(5) (2009)","DOI":"10.7763\/IJET.2009.V1.86"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Bhargava, B., Oliveiral, R., Zhang, Y., Idika, N.: Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks. In: IEEE International Conference on Distributed Computing Systems Workshops (2009)","DOI":"10.1109\/ICDCSW.2009.77"},{"key":"30_CR14","volume-title":"A testbed for MANETs: Implementation, Experiences and Learned Lessons","author":"L. Barolli","year":"2010","unstructured":"Barolli, L., Ikeda, M., Xhafa, F., Duresi, A.: A testbed for MANETs: Implementation, Experiences and Learned Lessons. IEEE, Los Alamitos (2010)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Zhang, H.: Research on Designing and Implementing an Experimental MANET Testbed. In: IEEE International Conference on Communication Software and networks (2009)","DOI":"10.1109\/ICCSN.2009.165"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22203-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:19:13Z","timestamp":1560327553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22203-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222023","9783642222030"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22203-0_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}