{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:50:20Z","timestamp":1742385020677,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/glocom.2010.5683548","type":"proceedings-article","created":{"date-parts":[[2011,1,10]],"date-time":"2011-01-10T21:19:12Z","timestamp":1294694352000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Risk-Aware Response for Mitigating MANET Routing Attacks"],"prefix":"10.1109","author":[{"given":"Ziming","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Ruoyu","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.262"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-24747-0_5","article-title":"Enhanced Reputation Mechanism for Mobile Ad Hoc Networks","author":"liu","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_3"},{"journal-title":"RFC3561 Ad hoc on-demand distance vector (AODV) routing","year":"2003","author":"perkins","key":"ref15"},{"journal-title":"UM-OLSR implementation (version 0 8 8) for NS2","year":"2007","author":"ros","key":"ref16"},{"key":"ref17","article-title":"Combination of evidence in Dempster-Shafer theory","volume":"835","author":"sentz","year":"2002","journal-title":"Report No SAND 2002"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"journal-title":"RFC3626 Optimized link state routing protocol (OLSR)","year":"2003","author":"clausen","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.21","article-title":"Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control","volume":"2007","author":"cheng","year":"2007","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"ref5","article-title":"The ns manual-the VINT project","author":"fall","year":"2001","journal-title":"University of California"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2004.1","article-title":"A survey of secure wireless ad hoc routing","volume":"2","author":"hu","year":"2004","journal-title":"IEEE Security and Privacy Magazine"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2005.07.003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1400219"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.870"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_17"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"view","year":"2006","journal-title":"Selected Areas in Communications IEEE Journal on"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/11856214_13","article-title":"Demem: Distributed evidence-driven message exchange intrusion detection model for manet","author":"tseng","year":"2006","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532054"}],"event":{"name":"GLOBECOM 2010 - 2010 IEEE Global Communications Conference","start":{"date-parts":[[2010,12,6]]},"location":"Miami, FL, USA","end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 IEEE Global Telecommunications Conference GLOBECOM 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5682081\/5683069\/05683548.pdf?arnumber=5683548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T04:35:32Z","timestamp":1637123732000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5683548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/glocom.2010.5683548","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}