{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:00:29Z","timestamp":1743087629491,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_28","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"349-359","source":"Crossref","is-referenced-by-count":0,"title":["Agent Based IDS Using RMBOPB Technique in MANET"],"prefix":"10.1007","author":[{"given":"Khondekar Lutful","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Somnath","family":"Bera","sequence":"additional","affiliation":[]},{"given":"Pranab","family":"Bag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"28_CR1","volume-title":"Ad Hoc Wireless Networks Architecture and Protocols","author":"CSR Murthy","year":"2005","unstructured":"Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks Architecture and Protocols. Pearson Education, India (2005)"},{"key":"28_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/b99485","volume-title":"Ad Hoc Networks: Technologies and Protocols","author":"P Mohapatra","year":"2005","unstructured":"Mohapatra, P., Krishnamurthy, S.: Ad Hoc Networks: Technologies and Protocols. Springer, New York (2005)"},{"key":"28_CR3","volume-title":"Ad Hoc Mobile Wireless Networks: Protocols and Systems","author":"C-K Toh","year":"2002","unstructured":"Toh, C.-K.: Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, Englewood Cliffs (2002)"},{"key":"28_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511619755","volume-title":"Security and Quality of Service in Ad Hoc Wireless Network","author":"A Mishra","year":"2008","unstructured":"Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Network. Cambridge University Press, New York (2008)"},{"key":"28_CR5","volume-title":"Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications","author":"SK Sarkar","year":"2008","unstructured":"Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. Auerbach Publications, Boca Raton (2008)"},{"key":"28_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71760-9","volume-title":"Introduction to Network Simulator NS2","author":"T Issariyakul","year":"2009","unstructured":"Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, Boston (2009)"},{"key":"28_CR7","unstructured":"Marc Greis\u2019 Tutorial. http:\/\/www.isi.edu\/nsnam\/ns\/tutorial\/ . Last accessed 8 Jun 2015"},{"key":"28_CR8","unstructured":"Rehmani, M.H., Doria, S., Senouci, M.R.: A Tutorial on the Implementation of Ad-Hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2). www.arxiv.org\/pdf\/1007.4065 . Last accessed 8 Jun 2015"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Mandal, J.K., Hassan, K.L.: A novel technique to detect intrusion in MANET. Int. J. Netw. Secur. Appl. (IJNSA), 5(5) (2013). Online ISSN 0974-9330, Print ISSN 0975-2307","DOI":"10.5121\/ijnsa.2013.5515"},{"key":"28_CR10","unstructured":"Mandal, J.K., Hassan, K.L.: Secure agent base data transmission in MANET. Int. J. Adv. Res. Comput. Sci. (IJARCS), 4(8) (2013). ISSN 0976-5697"},{"key":"28_CR11","unstructured":"Mandal, J.K., Hassan, K.L.: Agent based Intrusion Detection System in MANET. In: Proceedings of Third International Conference on Computer Science & Information Technology (CCSIT 2013). LNICST, Bangalore, India, 18\u201320 February 2013, p. 76. Springer (2013). ISSN 1867-8211"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Dokurer, S., Ert, Y.M., Acar, C.E.: Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings, pp. 148\u2013153. IEEE (2007)","DOI":"10.1109\/SECON.2007.342872"},{"key":"28_CR13","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. www.cs.ucsb.edu\/~ebelding\/txt\/wmcsa99.pdf . Accessed 8 June 2015"},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70\u201375 (2002)","journal-title":"IEEE Commun. Mag."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S., Park, S.: Black hole attack in mobile ad hoc networks. In: ACM Southeast Regional Conference, pp. 96\u201397 (2004)","DOI":"10.1145\/986537.986560"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"A Mishra","year":"2004","unstructured":"Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad-hoc networks. IEEE Wirel. Commun. 11, 48\u201360 (2004)","journal-title":"IEEE Wirel. Commun."},{"issue":"3","key":"28_CR17","first-page":"383","volume":"83","author":"B Usha","year":"2012","unstructured":"Usha, B.: Understanding black hole attack in MANET. Eur. J. Sci. Res. 83(3), 383\u2013396 (2012). ISSN 1450-216X","journal-title":"Eur. J. Sci. Res."},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM (2000)","DOI":"10.1145\/345910.345958"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1023\/A:1024600519144","volume":"9","author":"Y Zhang","year":"2003","unstructured":"Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9, 545\u2013556 (2003). Kluwer Academic Publishers","journal-title":"Wirel. Netw."},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN 2003 Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp 135\u2013147 (2003)","DOI":"10.1145\/986858.986877"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.adhoc.2013.08.017","volume":"13","author":"A Nadeem","year":"2014","unstructured":"Nadeem, A., Howarth, M.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368\u2013380 (2014)","journal-title":"Ad Hoc Netw."},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Korba, A.A., Nafaa, M., Ghamri-Doudane, Y.: Anomaly-based intrusion detection system for ad hoc networks. In: 2016 7th International Conference on Network of the Future (NOF), Rio de Janeiro, Brazil, 16\u201318 November 2016. IEEE (2016). Electronic ISBN 978-1-5090-4671-3","DOI":"10.1109\/NOF.2016.7810132"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:07:49Z","timestamp":1570126069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}