{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:27:48Z","timestamp":1742927268171,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":13,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132216018"},{"type":"electronic","value":"9788132216025"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1602-5_45","type":"book-chapter","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T12:58:40Z","timestamp":1393333120000},"page":"419-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack"],"prefix":"10.1007","author":[{"given":"Avita","family":"Katal","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Wazid","sequence":"additional","affiliation":[]},{"given":"R H","family":"Goudar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,26]]},"reference":[{"key":"45_CR1","unstructured":"Begum, S. A., Mohan, L., Ranjitha, B.: Techniques for resilience of denial of service attacks in mobile ad hoc networks. In: Proceedings published by International Journal of Electronics Communication and Computer Engineering, vol. 3(1), NCRTCST, ISSN 2249\u2013071X National Conference on Research Trends in Computer Science and Technology (2012)"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Barkhodia, E., Singh, P., Walia, G. K.: Performance analysis of AODV using HTTP traffic under Black Hole Attack in MANET. Comput. Sci. Eng. Int. J. (CSEIJ) 2(3), (2012)","DOI":"10.5121\/cseij.2012.2308"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Jan, V. M., Welch, I., Seah, W. K. G: Security threats and solutions in MANETs: a case study using AODV and SAODV. Elsevier J. Netw. Comput. Appl. 35, 1249\u20131259 (2012)","DOI":"10.1016\/j.jnca.2012.01.019"},{"key":"45_CR4","unstructured":"Wazid, M., Singh, R. K., Goudar, R. H.: A survey of attacks happened at different layers of mobile ad-hoc network and some available detection techniques. In: Proceedings published by International Journal of Computer Applications (IJCA) International Conference on Computer Communication and Networks CSI- COMNET, Hawaii, Dec (2011)"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Adam, G., Kapoulas, V., Bouras, C., Kioumourtzis, G., Gkamas, A., Tavoularis. N.: Performance evaluation of routing protocols for multimedia transmission over mobile ad hoc networks. In: IEEE International Conference on Wireless and Mobile Networking Conference (WMNC), (2011)","DOI":"10.1109\/WMNC.2011.6097250"},{"key":"45_CR6","unstructured":"Jayasingh, B. B., Swathi, B.: A novel metric for detection of jellyfish reorder attack on ad hoc network. BVICAM\u2019S Int. J. Inf. Technol. (BIJIT) 2(1), ISSN 0973\u20135658 (2010)"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Ramesh, V., Subbaiah, P., Koteswar Rao, N., Subhashini, N., Narayana.D.: Performance comparison and analysis of preemptive-DSR and TORA. Int. J. Ad hoc, Sens. and Ubiquitous Comput. (IJASUC) 1(4) (2010)","DOI":"10.5121\/ijasuc.2010.1405"},{"key":"45_CR8","unstructured":"Thakare, A. N., Joshi, M. Y.: Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks. IJCA Special Issue on Mobile Ad-hoc Networks MANETs (2010)"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Cai, J., Yi, P., Tian, Y., Zhou, Y., Liu, N.: The simulation and comparison of routing attacks on DSR protocol. In: IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), Beijing, September (2009)","DOI":"10.1109\/WICOM.2009.5302474"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Amer, S. H., Hamilton, J. A.: DSR and TORA in fixed and mobile wireless networks. In: Proceedings of ACM-SE, ACM, Auburn, March (2008)","DOI":"10.1145\/1593105.1593226"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Alshanyour, A. M., Baroudi, U.: Bypass AODV: improving performance of ad hoc on- demand distance vector (AODV) routing protocol in wireless ad hoc networks. In: Proceedings of ACM Ambi-sys, ACM Digital Library, Quebec city, 11\u201314 Feb (2008)","DOI":"10.4108\/ICST.AMBISYS2008.2895"},{"key":"45_CR12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"H. L. Nguyen","year":"2008","unstructured":"Nguyen, H. L., Nguyen, U. T.: A study of different types of attacks on multicast in mobile ad hoc networks. Elsevier J. Ad Hoc Netw. 6, 32\u201346 (2008)","journal-title":"Elsevier J. Ad Hoc Netw."},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Aad, I., Hubaux, J.-P., Knightly, E. W.: Denial of service resilience in ad hoc networks. In: Proceedings of ACM MobiCom, Philadelphia, Sept 26\u2013Oct 1 (2004)","DOI":"10.1145\/1023720.1023741"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1602-5_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T01:08:06Z","timestamp":1676855286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1602-5_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132216018","9788132216025"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1602-5_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 February 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}