{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:13Z","timestamp":1730248633516,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750209","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"290-295","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of security attacks on AODV routing"],"prefix":"10.1109","author":[{"given":"Mohamed A.","family":"Abdelshafy","sequence":"first","affiliation":[]},{"given":"Peter J. B.","family":"King","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508283"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2012.112"},{"key":"12","article-title":"Security attacks in mobile adhoc networks","author":"singh","year":"2012","journal-title":"IJCA Proceedings on National Workshop-CumConference on Recent Trends in Mathematics and Computing 2011"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940916"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.5120\/3337-4592"},{"key":"7","first-page":"7","article-title":"A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks","volume":"2","author":"manikandan","year":"2011","journal-title":"IJACSA-International Fournal of Advanced Computer Science and Applications"},{"key":"6","article-title":"Security attacks in mANET-A review","author":"kumar","year":"2012","journal-title":"IJCA Proceedings on National Workshop-Cum-Coriference on Recent Trends in Mathematics and Computing 2011"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.037666"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5120\/1439-1947"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514256"},{"year":"0","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750209.pdf?arnumber=6750209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:47:44Z","timestamp":1490309264000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750209","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}