{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:49Z","timestamp":1725702169624},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_6","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"54-63","source":"Crossref","is-referenced-by-count":2,"title":["Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET"],"prefix":"10.1007","author":[{"given":"Monika","family":"Darji","sequence":"first","affiliation":[]},{"given":"Bhushan","family":"Trivedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks. Pearson Education (2008)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/345910.345958","volume-title":"Proc. MOBICOM 2000","author":"Y. Zhang","year":"2000","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. MOBICOM 2000, pp. 275\u2013283. ACM Press, Boston (2000)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/986858.986877","volume-title":"Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003","author":"Y.-A. Huang","year":"2003","unstructured":"Huang, Y.-A., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, pp. 135\u2013147. ACM, NY (2003)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Kachirski, O., Guha, R.: Efficient Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proc. IEEE Hawaii Int\u2019l Conf. System Sciences, HICSS (2003)","DOI":"10.1109\/HICSS.2003.1173873"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.comcom.2007.10.024","volume":"31","author":"H. Otrok","year":"2008","unstructured":"Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun.\u00a031(4), 708\u2013721 (2008)","journal-title":"Comput. Commun."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Otrok, H., Wang, L., Debbabi, M., Bhattacharya, P.: Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing\u00a08(1) (2011)","DOI":"10.1109\/TDSC.2009.22"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Zeng, Chen, Z.: A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET. In: International Conference on Network Computing and Information Security (2011)","DOI":"10.1109\/NCIS.2011.184"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Anderegg, L., Eidenbenz, S.: Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In: Proc. ACM MobiCom (2003)","DOI":"10.1145\/938985.939011"},{"key":"6_CR9","unstructured":"Agents, \n                    \n                      http:\/\/www.java2s.com\/Article\/Java\/SOAservices\/The_Architecture_of_Aglets_IBMs_Mobile_Java_Agents_Under_the_Hood.html"},{"key":"6_CR10","unstructured":"Albers, P., Camp, O., Percher, J.-M., Jouga, B., Ludovic, M., Puttini, R.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proc. of the First International Workshop on Wireless Information Systems, WIS 2002, pp. 1\u201312 (2002)"},{"key":"6_CR11","first-page":"402","volume-title":"Proceedings of the 20th International Conference on Distributed Computing Systems, ICDCS 2000","author":"A.R. Tripathi","year":"2000","unstructured":"Tripathi, A.R.: A Security Architecture for Mobile Agents in Ajanta. In: Proceedings of the 20th International Conference on Distributed Computing Systems, ICDCS 2000, pp. 402\u2013409. IEEE Computer Society, Washington, DC (2000)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K.: A Cluster-Based Approach for Routing in Dynamic Networks. Proc. ACM SIGCOMM Computer Comm. Rev. (1997)","DOI":"10.1145\/263876.263885"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:59Z","timestamp":1620132359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}