{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:40Z","timestamp":1761581680460,"version":"3.41.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"S6","license":[{"start":{"date-parts":[[2018,3,31]],"date-time":"2018-03-31T00:00:00Z","timestamp":1522454400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s10586-018-2545-9","type":"journal-article","created":{"date-parts":[[2018,3,31]],"date-time":"2018-03-31T10:18:46Z","timestamp":1522491526000},"page":"15205-15212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis"],"prefix":"10.1007","volume":"22","author":[{"given":"K.","family":"Bala","sequence":"first","affiliation":[]},{"given":"S.","family":"Jothi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Chandrasekar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,31]]},"reference":[{"issue":"2","key":"2545_CR1","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1109\/TVT.2016.2557808","volume":"66","author":"N Marchang","year":"2017","unstructured":"Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad-hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684\u20131695 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"14","key":"2545_CR2","doi-asserted-by":"publisher","first-page":"2484","DOI":"10.1002\/sec.1484","volume":"9","author":"S Kumar","year":"2016","unstructured":"Kumar, S., Dutta, K.: Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. J. Secur. Commun. Netw. 9(14), 2484\u20132556 (2016)","journal-title":"J. Secur. Commun. Netw."},{"issue":"1","key":"2545_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijcses.2015.6102","volume":"6","author":"A Dorri","year":"2015","unstructured":"Dorri, A., Kamel, S.R., Kheyrkhah, E.: Security challenges in mobile ad hoc networks: a survey. Int. J. Comput. Sci. Eng. Surv. 6(1), 1\u20137 (2015)","journal-title":"Int. J. Comput. Sci. Eng. Surv."},{"key":"2545_CR4","doi-asserted-by":"crossref","unstructured":"Chourasia, .R, Boghey, R.K.: Novel IDS security against attacker routing misbehavior of packet dropping in MANET. In: Proceedings of the IEEE 7th International Conference on Cloud Computing, Data Science & Engineering\u2014Confluence, pp. 456\u2013460 (2017)","DOI":"10.1109\/CONFLUENCE.2017.7943194"},{"key":"2545_CR5","doi-asserted-by":"crossref","unstructured":"Prasanna Lakshmi, G.S., Kumar, S., Patil, B.: Signature intrusion detection using a zone based AODV routing protocol for MANETs. In: Proceedings of the 4th International IEEE Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1\u20137 (2017)","DOI":"10.1109\/ICACCS.2017.8014693"},{"key":"2545_CR6","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, S., Murugaboopathi, G.: Secure intrusion detection system in mobile ad hoc networks using RSA algorithm. In: Proceedings of the Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pp. 354\u2013357 (2017)","DOI":"10.1109\/ICRTCCM.2017.73"},{"key":"2545_CR7","doi-asserted-by":"crossref","unstructured":"Nanaware, P.M., Babar, S.D.: Trust system based intrusion detection in mobile ad hoc network (MANET). In: Proceedings of the IEEE International Conference on Next Generation Intelligent Systems (ICNGIS), pp. 1\u20134 (2016)","DOI":"10.1109\/ICNGIS.2016.7854054"},{"key":"2545_CR8","doi-asserted-by":"crossref","unstructured":"Carvalho, J.M.A., Costa, P.C.G.: Collaborative approach for a MANET intrusion detection system using multilateration. In: Proceedings of the 11th IEEE International Conference on Computer Engineering & Systems (ICCES). pp. 59\u201365 (2016)","DOI":"10.1109\/ICCES.2016.7821976"},{"key":"2545_CR9","doi-asserted-by":"crossref","unstructured":"Korba, A.A., Nafaa, M., Ghamri-Doudane, Y.: Anomaly-based intrusion detection system for ad-hoc networks. In: Proceedings of the 7th IEEE International Conference on the Network of the Future (NOF), pp. 1\u20133 (2016)","DOI":"10.1109\/NOF.2016.7810132"},{"key":"2545_CR10","doi-asserted-by":"crossref","unstructured":"Carvalho, J.M.A., Costa, P.C.G.: CMIDS: collaborative MANET intrusion detection system. In: Proceedings of the IEEE International Conference on Cyber Conflict (CyCon U.S.), pp. 1\u20135 (2016)","DOI":"10.1109\/CYCONUS.2016.7836613"},{"key":"2545_CR11","doi-asserted-by":"crossref","unstructured":"Nemade, D., Bhole, A.T.: Performance evaluation of EAACK IDS using AODV and DSR routing protocols in MANET. In: Proceedings of the International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), pp. 126\u2013131 (2015)","DOI":"10.1109\/ERECT.2015.7499000"},{"key":"2545_CR12","doi-asserted-by":"crossref","unstructured":"Kazi, S.B., Adhoni, M.A.: Secure intrusion detection system to detect malevolent node in MANETs. In: Proceedings of the International Conference on Electrical, Electronics and Optimization Techniques (ICEEOT), pp. 1363\u20131368 (2016)","DOI":"10.1109\/ICEEOT.2016.7754906"},{"key":"2545_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5504-0","author":"A Suresh","year":"2018","unstructured":"Suresh, A., Reyana, A., Varatharajan, R.: CEMulti-core architecture for optimization of energy over heterogeneous environment with high performance smart sensor devices. Wirel. Pers. Commun. (2018). https:\/\/doi.org\/10.1007\/s11277-018-5504-0","journal-title":"Wirel. Pers. Commun."},{"key":"2545_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1293-6","author":"A Suresh","year":"2017","unstructured":"Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Comput. (2017). https:\/\/doi.org\/10.1007\/s10586-017-1293-6","journal-title":"Cluster Comput."},{"key":"2545_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1760-8","author":"A Chinnasamy","year":"2018","unstructured":"Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Clust. Comput. (2018). https:\/\/doi.org\/10.1007\/s10586-018-1760-8","journal-title":"Clust. Comput."},{"issue":"1","key":"2545_CR16","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1016\/j.asoc.2010.03.004","volume":"11","author":"TS Sobh","year":"2011","unstructured":"Sobh, T.S., Mostafa, W.M.: A cooperative immunological approach for detecting network anomaly. Appl. Soft Comput. J. 11(1), 1275\u20131283 (2011)","journal-title":"Appl. Soft Comput. J."},{"issue":"3","key":"2545_CR17","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TIE.2010.2052533","volume":"58","author":"F Macia-Perez","year":"2011","unstructured":"Macia-Perez, F., Mora-Gimeno, F.J., Marcos-Jorquera, D., Gil-Martinez-Abarka, J.A.: Network intrusion detection system embedded on a smart sensor. IEEE Trans. Ind. Electron. 58(3), 722\u2013732 (2011)","journal-title":"IEEE Trans. Ind. Electron."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2545-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2545-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2545-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T08:35:54Z","timestamp":1751531754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2545-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,31]]},"references-count":17,"journal-issue":{"issue":"S6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["2545"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2545-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,3,31]]},"assertion":[{"value":"13 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}