{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:14:37Z","timestamp":1725484477693},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cscesm.2015.7331887","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:44:45Z","timestamp":1448300685000},"page":"163-169","source":"Crossref","is-referenced-by-count":1,"title":["Performance analysis of security attacks and improvements of routing protocols in MANET"],"prefix":"10.1109","author":[{"given":"Kuldeep","family":"Singh","sequence":"first","affiliation":[]},{"given":"Amanat","family":"Boparai","sequence":"additional","affiliation":[]},{"given":"Vrinda","family":"Handa","sequence":"additional","affiliation":[]},{"given":"Sudesh","family":"Rani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00201"},{"journal-title":"Performance evaluation of dsr aomdv and zrp routing protocols in manets by using ns2","year":"0","author":"rao","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2393216.2393283"},{"key":"ref5","first-page":"1","article-title":"A simulation analysis of flooding attack in manet using ns-3 in Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)","author":"bandyopadhyay","year":"2011","journal-title":"2011 2nd International Conference on IEEE"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033833"},{"key":"ref7","first-page":"290","article-title":"Analysis of security attacks on aodv routing;&#x2019;","author":"abdelshafy","year":"2013","journal-title":"Internet Technology and Secured Transactions (ICITST) 2013 8th International Conference for IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2005.1554018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/17757-8870"},{"key":"ref1","first-page":"1","article-title":"Understanding dynamic denial of service attacks in mobile ad hoc networks;&#x2019;","author":"xing","year":"2006","journal-title":"Military Communications Conference 2006 MILCOM 2006 IEEE"}],"event":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","start":{"date-parts":[[2015,9,21]]},"location":"Lodz, Poland","end":{"date-parts":[[2015,9,23]]}},"container-title":["2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322102\/7331817\/07331887.pdf?arnumber=7331887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:00:32Z","timestamp":1602673232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7331887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/cscesm.2015.7331887","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}