{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:57:59Z","timestamp":1725641879827},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_12","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T09:37:08Z","timestamp":1323423428000},"page":"85-94","source":"Crossref","is-referenced-by-count":4,"title":["MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Debdutta Barman","family":"Roy","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Roy, D.B., Chaki, R., Chaki, N.: A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. International Journal of Network Security & Its Applications (IJNSA)\u00a01 (April 2009)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Onashoga, S.A., Akinde, A.D., Sodiya, A.S.: A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems. Issues in Informing Science and Information Technology\u00a06 (2009)","DOI":"10.28945\/3372"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Chaki, R., Chaki, N.: IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. In: Proc. of the 6th Int\u2019l Conf. on Computer Information Systems and Industrial Management Applications (CISIM 2007), pp. 179\u2013184 (June 2007)","DOI":"10.1109\/CISIM.2007.38"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Jahnke, M., Toelle, J., Finkenbrink, A., Wenzel, A., et al.: Methodolo gies and Frameworks for Testing IDS in Adhoc Networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, pp. 113\u2013122 (2007)","DOI":"10.1145\/1298239.1298259"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.jnca.2005.06.001","volume":"30","author":"A. Abraham","year":"2007","unstructured":"Abraham, A., Jain, R., Thomas, J., Han, S.Y.: D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Application\u00a030, 81\u201398 (2007)","journal-title":"Journal of Network and Computer Application"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"Y.-C. Hu","year":"2006","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas of Communications\u00a024(2), 370\u2013380 (2006)","journal-title":"IEEE Journal on Selected Areas of Communications"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"217","DOI":"10.2498\/cit.2006.03.05","volume":"14","author":"A.S. Sodiya","year":"2006","unstructured":"Sodiya, A.S.: Multi-level and Secured Agent-based Intrusion Detection System. Journal of Computing and Information Technology - CIT\u00a014(3), 217\u2013223 (2006), doi:10.2498\/cit.2006.03.05","journal-title":"Journal of Computing and Information Technology - CIT"},{"key":"12_CR8","unstructured":"Mitrokotsa, A., Mavropodi, R., Douligeris, C.: Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks, Ayia Napa, Cyprus, July 6-7 (2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/11610496_134","volume-title":"Advanced Web and Network Technologies, and Applications","author":"H.Q. Wang","year":"2006","unstructured":"Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 965\u2013970. Springer, Heidelberg (2006)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, U.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications\u00a011, 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y.-C. Hu","year":"2004","unstructured":"Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy Magazine\u00a02(3), 28\u201339 (2004)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"12_CR12","unstructured":"Eid, M., Artail, H., Kayssi, A., Chehab, A.: An adaptive intrusion detection and defense system based on mobile agents. In: Innovations in Information Technologies, IIT 2004 (2004)"},{"key":"12_CR13","unstructured":"Li, C., Song, Q., Zhang, C.: MA-IDS: Architecture for distributed intrusion detection using mobile agents. In: 2nd International Conference on Information Technology for Application, ICITA 2004 (2004)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-30178-3_23","volume-title":"Mobility Aware Technologies and Applications","author":"K. Deeter","year":"2004","unstructured":"Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.T.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol.\u00a03284, pp. 244\u2013253. Springer, Heidelberg (2004)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, vol.\u00a03, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. NIST Interim Report (IR) \u20136416 (October 1999)","DOI":"10.6028\/NIST.IR.6416"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:49:21Z","timestamp":1561038561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}