{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T16:59:29Z","timestamp":1772038769518,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1173873","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":107,"title":["Effective intrusion detection using multiple sensors in wireless ad hoc networks"],"prefix":"10.1109","author":[{"given":"O.","family":"Kachirski","sequence":"first","affiliation":[]},{"given":"R.","family":"Guha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"197","article-title":"Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel","author":"chiang","year":"1997","journal-title":"Proceedings of IEEE SICON"},{"key":"ref11","first-page":"660","article-title":"Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA)","volume":"2","author":"ramanujan","year":"0","journal-title":"Proc 21st Century Military Communication Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904814"},{"key":"ref13","first-page":"1165","article-title":"POM-A Mobile Agent Security Model against Malicious Hosts","volume":"2","author":"guan","year":"2000","journal-title":"Proceedings of the 4th International Conference on High Performance Computing in the Asia-Pacific Region"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2001.938144"},{"key":"ref4","first-page":"2165","article-title":"Fuzzy Intrusion Detection","volume":"4","author":"siraj","year":"0","journal-title":"Joint 9th IFSA World Congress and 20th NAFIPS International Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PDSE.2000.847862"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932184"},{"key":"ref8","first-page":"134","article-title":"The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent","author":"tao","year":"2000","journal-title":"Proceedings of 34th International Conference on Technology of Object-Oriented Languages and Systems"},{"key":"ref7","article-title":"Lightweight Agents for Intrusion Detection","author":"helmer","year":"2000","journal-title":"Technical Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932190"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","location":"Big Island, HI, USA","start":{"date-parts":[[2003,1,9]]},"end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01173873.pdf?arnumber=1173873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T19:21:51Z","timestamp":1489432911000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1173873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1173873","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}