{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:06:55Z","timestamp":1729638415500,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643700","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:34:10Z","timestamp":1291152850000},"page":"7-12","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion detection: Ad-hoc networks to ambient intelligence framework"],"prefix":"10.1109","author":[{"given":"Rituparna","family":"Chaki","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Grid Computing Security","year":"2007","author":"chakrabarti","key":"ref10"},{"article-title":"Security Engineering for Ambient Intelligence: A Manifesto","year":"2007","author":"mafia","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2007.342641"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861384"},{"key":"ref14","article-title":"Using AmI systems for exchanging health information: Considering trust and privacy issues","author":"little","year":"2006","journal-title":"ESRC E-Society Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295441"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277468"},{"key":"ref17","article-title":"Securing Wireless Ad Hoc Networks under Noise and Imperfect Monitoring","author":"yu","year":"2006","journal-title":"UM Theses and Dissertations Digital Repository at the University of Maryland (DRUM)"},{"key":"ref18","first-page":"185","article-title":"Totally Distributed Key Management for Dynamic Groups in MANETs","author":"mukherjee","year":"2005","journal-title":"Proc of the 24th IEEE Int'l Performance"},{"key":"ref19","article-title":"Using REWARD to detect team black-hole attacks in wireless sensor networks","author":"karakehayov","year":"0","journal-title":"REALWSN 2005"},{"key":"ref28","article-title":"Secure Routing For Mobile Ad hoc Networks","author":"papadimitratos","year":"2002","journal-title":"Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)"},{"key":"ref4","article-title":"Intrusion Detection in Inteligent Agent-Based Non-traditional Grids","author":"bogdan","year":"2009","journal-title":"International Conference on Education Technology and Computer"},{"key":"ref27","first-page":"1","article-title":"Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches","author":"albers","year":"2002","journal-title":"Proc of the 4th Int'l Conference on Enterprise Information Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2008.14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/AIS-2009-0001","article-title":"New research perspectives on ambient intelligence","volume":"i","author":"aarts","year":"2009","journal-title":"Journal of Ambient Intelligence and Smart Environments"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2007.38"},{"key":"ref7","article-title":"Redundancy at Link Level for Non-traditional Grids Implemented with Inteligent Agents","author":"ancusa","year":"2008","journal-title":"4th Int Conference on networked computing and advanced information management"},{"key":"ref2","article-title":"A new cluster-based wormhole intrusion Detection algorithm for mobile ad-hoc Networks","volume":"1","author":"debdutta barman","year":"2009","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2007.4412806"},{"key":"ref1","first-page":"278","article-title":": a new, cluster based algorithm for black hole IDS","volume":"3","author":"debdutta barman","year":"2009","journal-title":"Security and Communication Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.38"},{"key":"ref22","first-page":"1275","article-title":"An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks","author":"ngai","year":"2004","journal-title":"Proceedings of IEEE Aerosnace Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1404990"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1244370"},{"key":"ref23","article-title":"Intrusion detection in MANETs - the second wall of defense","author":"nadkarni","year":"2003","journal-title":"IEEE IECON"},{"key":"ref26","first-page":"130","article-title":"Reputation Methods for Routing Security for Mobile Ad Hoc Networks","author":"yau","year":"2003","journal-title":"Proc of IEEE Workshop on Mobile Future and Symposium on Trends in Communications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RAWCON.2003.1227896"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","start":{"date-parts":[[2010,10,8]]},"location":"Krackow, Poland","end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643700.pdf?arnumber=5643700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,14]],"date-time":"2020-06-14T06:27:06Z","timestamp":1592116026000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643700","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}