{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:59:17Z","timestamp":1730199557788,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/atnac.2018.8615267","type":"proceedings-article","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T19:49:51Z","timestamp":1547754591000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["AIS Reputation Mechanism in MANET"],"prefix":"10.1109","author":[{"given":"Lincy Elizebeth","family":"Jim","sequence":"first","affiliation":[]},{"given":"Mark A","family":"Gregory","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3200"},{"journal-title":"Security Schemes for the OLSR Protocol for Ad Hoc Networks","year":"2005","author":"raffo","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2011.6021517"},{"key":"ref13","volume":"1","author":"saha","year":"2013","journal-title":"A Review on Attacks and Secure Routing Protocols in Manet"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/0471656895"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2004.1","article-title":"A Survey of Secure Wireless Ad Hoc Routing","volume":"2","author":"hu","year":"2004","journal-title":"IEEE Security and Privacy"},{"key":"ref16","article-title":"Detecting Selfish and Malicious Nodes in MANETs","author":"sch\u00fctte","year":"2006","journal-title":"Seminar Sicherheit In Selbstorganisierenden Netzen Hpi\/Universit&#x00E4;t Potsdam"},{"key":"ref17","first-page":"429","article-title":"Using dendritic cell algorithm to detect the resource consumption attack over MANET","author":"abdelhaq","year":"2011","journal-title":"181 CCIS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1084\/jem.137.5.1142"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13191-7_29"},{"key":"ref3","first-page":"275","article-title":"A reputation-based trust model for peer-to-peer e-commerce communities","author":"li","year":"2003","journal-title":"EEE International Conference on E-Commerce 2003 CEC 2003 COEC"},{"key":"ref6","first-page":"546","article-title":"The Black-Hole Node Attack in MANET","author":"sharma","year":"2012","journal-title":"2012 Second International Conference on Advanced Computing & Communication Technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2007.4449664"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"journal-title":"A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks","year":"2007","author":"mccoy","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01193336"},{"key":"ref20","article-title":"Towards a conceptual framework for innate immunity","author":"jamie","year":"2004","journal-title":"3rd International Conference on Artificial Immune Systems (ICARIS 2004)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-3083.2001.00974.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85072-4_26"},{"year":"0","key":"ref24"},{"key":"ref23","volume":"abs 801 3549","author":"aickelin","year":"2008","journal-title":"The Danger Theory and Its Application to Artificial Immune Systems"},{"key":"ref26","first-page":"1","article-title":"Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs","volume":"11","author":"jhaveri","year":"2012","journal-title":"INFOCOMP Journal of Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"}],"event":{"name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2018,11,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2018,11,23]]}},"container-title":["2018 28th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598648\/8615121\/08615267.pdf?arnumber=8615267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:27:08Z","timestamp":1643225228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8615267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/atnac.2018.8615267","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}