{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T18:13:19Z","timestamp":1723572799889},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T00:00:00Z","timestamp":1457395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11277-016-3233-9","type":"journal-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T15:57:57Z","timestamp":1457452677000},"page":"861-873","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET"],"prefix":"10.1007","volume":"90","author":[{"given":"M.","family":"Malathi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Jayashri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,3,8]]},"reference":[{"key":"3233_CR1","unstructured":"Dinesh, K. S. (2014). Routing overhead reduction and selection of stable paths in MANET. International Journal of Inventions in Computer Science and Engineering (IJICSE), 1(9)."},{"issue":"3","key":"3233_CR2","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TIE.2012.2196010","volume":"60","author":"E Shakshuki","year":"2013","unstructured":"Shakshuki, E., Kang, N., & Sheltami, T. (2013). EAACK\u2014A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089\u20131098.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"3233_CR3","unstructured":"Li, S.-C., Yang, H.-L., & Zhu, Q.-S. (2010). Research on MANET security architecture design. 2nd International Conference on Signal Acquisition and Processing (pp. 90\u201393)."},{"key":"3233_CR4","doi-asserted-by":"crossref","unstructured":"Mustafa, H., & Xiong, Y. (2013). Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods. Proceedings of the 22nd wireless and optical communication conference on security for wireless networks, Chongqing. 16\u201318 May 2013 (pp. 659\u2013664).","DOI":"10.1109\/WOCC.2013.6676457"},{"issue":"5","key":"3233_CR5","first-page":"1908","volume":"3","author":"R Gowtham","year":"2014","unstructured":"Gowtham, R., Fatima, C. R. G., & Gopeeka, A. Chandrasekar. (2014). An improvised intrusion detection system for MANETs\u2014Defensive EAACK. IJARCET, 3(5), 1908\u20131915.","journal-title":"IJARCET"},{"key":"3233_CR6","unstructured":"Eissa, T., Razak, S. A., & Ngadi, M. A. (2009). A novel lightweight authentication scheme for mobile ad hoc networks. AJSE, 37, 2179\u20132192."},{"issue":"10","key":"3233_CR7","doi-asserted-by":"crossref","first-page":"4266","DOI":"10.1109\/TIE.2009.2027253","volume":"56","author":"KA Agha","year":"2009","unstructured":"Agha, K. A., Bertin, M.-H., Dang, T., Guitton, A., Minet, P., Val, T., & Viollet, J.-B. (2009). Which wireless technology for industrial wireless sensor networks? The development of OCARI technology. IEEE Transactions on Industrial Electronics, 56(10), 4266\u20134278.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"3233_CR8","doi-asserted-by":"crossref","unstructured":"Kang, N., Shakshuki, E. M., & Sheltami, T. R. (2011). Detecting forged acknowledgements in MANETs. In IEEE international conference on advanced information networking and applications (AINA) (pp. 488\u2013494).","DOI":"10.1109\/AINA.2011.84"},{"key":"3233_CR9","doi-asserted-by":"crossref","unstructured":"Chang, J.-M., Tsou, P.-C., Chao, H.-C., & Chen, J.-L. (2011). CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture. In IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE) (pp. 1\u20135).","DOI":"10.1109\/WIRELESSVITAE.2011.5940839"},{"key":"3233_CR10","unstructured":"Jain, Y. K., & Sharma, N. K. (2012). Secure trust based dynamic source routing in MANETs. International Journal of Scientific & Engineering Research 3(8), ISSN 2229-5518."},{"key":"3233_CR11","doi-asserted-by":"crossref","unstructured":"Patel, M., & Sharma, S. (2013). Detection of malicious attack in MANET a behavioral approach. In IEEE International Advance Computing Conference (IACC) (pp. 388\u2013393).","DOI":"10.1109\/IAdCC.2013.6514256"},{"issue":"4","key":"3233_CR12","first-page":"900","volume":"2","author":"LA Elizabeth","year":"2014","unstructured":"Elizabeth, L. A., Prasanth, S. H., Gopesh, S., & Sankar, B. K. (2014). Enhanced adaptive acknowledgment in MANET\u2019S with clustering. International Journal on Recent and Innovation Trends in Computing and Communication, 2(4), 900\u2013906.","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3233-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3233-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3233-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3233-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:33Z","timestamp":1559395113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3233-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,8]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["3233"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3233-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,8]]}}}