{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:17Z","timestamp":1725634697591},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_16","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T11:31:18Z","timestamp":1321529478000},"page":"237-252","source":"Crossref","is-referenced-by-count":4,"title":["A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs"],"prefix":"10.1007","author":[{"given":"Dong","family":"Hao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yizhi","family":"Ren","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"He, Q., Wu, D., Khosla, P.: SORI: A secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, GA, USA (March 2004)"},{"key":"16_CR2","volume-title":"Proceedings of the IEEE Globecom Conference","author":"K. Paul","year":"2002","unstructured":"Paul, K., Westhoff, D.: Context Aware Detection of Selfish Nodes in DSR Based Ad-hoc Networks. In: Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan. IEEE, Los Alamitos (2002)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehaviour Inmobile Ad Hoc Networks. In: International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: Performance Analyis of the CONFIDANT Protocol: Cooperation of Node - Fairnes. In: Daynamic Ad-Hoc Networks. In: Proceedings of IEEE\/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)","DOI":"10.1145\/513824.513828"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.K.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Sixth IFIP Conference on Security Communications, and Multimedia (CMS 2002), Portoroz Slovenia (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"16_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0470118474","volume-title":"Security for Wireless Ad Hoc Networks","author":"F. Anjum","year":"2007","unstructured":"Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks. Wiley-Interscience, Hoboken (2007) ISBN:0471756881"},{"key":"16_CR7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-31","volume-title":"Intrusion detection","author":"R.G. Bace","year":"2001","unstructured":"Bace, R.G.: Intrusion detection. Macmillan Publishing Co., Inc., Indianapolis (2001)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Xue, X.Y., Leneutre, J., BenOthman, J.: A Trust-based Routing Prtocol for Ad Hoc Networks. In: Proceeding of Mobile and Wireless Communications Networks, pp. 251\u2013262 (October 2004)","DOI":"10.1007\/0-387-23150-1_22"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 46\u201355 (April 1999)","DOI":"10.1109\/98.760423"},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11036-009-0164-7","volume":"15","author":"A. Rachedi","year":"2010","unstructured":"Rachedi, A., Benslimane, A., Otrok, H., Mohammed, N., Debbabi, M.: A Secure Mechanism Design-Based and Game Theoretical Model for MANTEs. Mobile Networks and Applications\u00a015(2), 191\u2013204 (2010)","journal-title":"Mobile Networks and Applications"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, X.F., Camp, J.L.: Game Theoretic Modeling and Analysis of Insider Threats. International Journal of Critical Infrastructure Protection, 75\u201380 (2008)","DOI":"10.1016\/j.ijcip.2008.08.001"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Ayday, E., Fekri, F.: A Protocol for Data Availability in Mobile Ad-Hoc Networks in the Presentce of Insider Attacks. Ad Hoc Networks\u00a08(2) (March 2010)","DOI":"10.1016\/j.adhoc.2009.07.001"},{"issue":"8","key":"16_CR13","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2008.12.002","volume":"25","author":"H. Janzadeh","year":"2009","unstructured":"Janzadeh, H., Fayazbakhsh, K., Dehghan, M., Mehran, S.: A Secure Credit-Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains. Future Generation Computer Systems\u00a025(8), 926\u2013934 (2009)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"16_CR14","first-page":"209","volume":"6","author":"X. Xue","year":"2006","unstructured":"Xue, X., Leneutre, J., Chen, L., Ben-Othman, J.: SWAN: A Secured Watchdog for Ad hoc Networks. International Journal of Computer Science and Network Security (IJCSNS)\u00a06(2), 209\u2013218 (2006)","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"16_CR15","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvcmxrzd","volume-title":"Game Theory for Applied Economics","author":"R. Gibbons","year":"1992","unstructured":"Gibbons, R.: Game Theory for Applied Economics. Princeton University Press, Princeton (1992)"},{"key":"16_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778","volume-title":"Network Security: A Decision and Game Theoretic Approach","author":"T. Alpcan","year":"2010","unstructured":"Alpcan, T., Basar, T.: Network Security: A Decision and Game Theoretic Approach, November 30. Cambridge University Press, Cambridge (2010)"},{"key":"16_CR17","volume-title":"Bayesian Theory","author":"J.M. Bernardo","year":"2000","unstructured":"Bernardo, J.M., Adrian, F., Smith, M.: Bayesian Theory. John Wiley & Sons, Chichester (2000)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T14:49:12Z","timestamp":1560955752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}