{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:06:43Z","timestamp":1773324403598,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2003.1209928","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"173-182","source":"Crossref","is-referenced-by-count":141,"title":["Detection and handling of MAC layer misbehavior in wireless networks"],"prefix":"10.1109","author":[{"given":"P.","family":"Kyasanur","sequence":"first","affiliation":[]},{"given":"N.H.","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/505696.505704"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570683"},{"key":"15","first-page":"1","article-title":"Algorithms for Selfish Agents","volume":"1563","author":"nisan","year":"1999","journal-title":"Proceedings of the Symposium on Theoretical Aspects of Computer Science LNCS"},{"key":"16","article-title":"Probabilistic Validation of Intrusion Tolerance","author":"sanders","year":"2002","journal-title":"Digest of Fast Abstracts The International Conference on Dependable Systems and Networks Bethesda Maryland"},{"key":"13","first-page":"255","article-title":"Mitigating Routing Misbehavior in Mobile Ad hoc Networks","author":"marti","year":"2000","journal-title":"Mobile Computing and Networking"},{"key":"14","article-title":"Game theoretic analysis of security in mobile ad hoc networks","volume":"rr 2 70","author":"michiardi","year":"2002","journal-title":"Technical Report"},{"key":"11","article-title":"Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations","volume":"2345","author":"konorski","year":"2002","journal-title":"NETWORKING Volume 2345 of LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209928"},{"key":"3","article-title":"Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods","author":"burroughs","year":"2002","journal-title":"Proceedings of IEEE International Performance Computing and Communication Conference"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"1","year":"1999","journal-title":"IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification"},{"key":"10","article-title":"Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting","volume":"2213","author":"konorski","year":"2001","journal-title":"PROMS Volume 2213 of LNCS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932173"},{"key":"6","article-title":"Ns notes and documentation","author":"pall","year":"2002","journal-title":"Technical Report"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992914"},{"key":"4","article-title":"Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks","volume":"dsc 2001 46","author":"buttyan","year":"2001","journal-title":"Technical Report"},{"key":"9","article-title":"Fairness, call establishment latency and other performance metrics","author":"jain","year":"1996","journal-title":"Technical Report"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"}],"event":{"name":"2003 International Conference on Dependable Systems and Networks, 2003.","location":"San Francisco, CA, USA"},"container-title":["2003 International Conference on Dependable Systems and Networks, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8589\/27228\/01209928.pdf?arnumber=1209928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:23:11Z","timestamp":1489425791000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1209928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dsn.2003.1209928","relation":{},"subject":[]}}