{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:50:23Z","timestamp":1770965423352,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/ict-dm.2014.6918582","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T18:07:43Z","timestamp":1413310063000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["A routing Ad Hoc network for disaster scenarios"],"prefix":"10.1109","author":[{"given":"Tahar Abbes","family":"Mounir","sequence":"first","affiliation":[]},{"given":"Merabet","family":"Samia","sequence":"additional","affiliation":[]},{"given":"Senouci","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Kechar","family":"Bouabdellah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/313237.313248"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298131"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(00)00040-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.64"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"13","article-title":"Energy efficient communication in ad hoc wireless networks","author":"marie feeney","year":"2011","journal-title":"Article Computer and Network Architectures Laboratory"},{"key":"14","year":"1999","journal-title":"Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-15512-3_18","article-title":"Anomaly detection and mitigation for disaster area networks","author":"cucurull","year":"2010","journal-title":"Article in 13th International Symposium on Recent Advances in Intrusion Detection Springer"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2011.36"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"20","first-page":"271","article-title":"IPv6 flow handoff in ad-hoc wireless networks using mobility prediction","author":"fan","year":"1999","journal-title":"Proceedings of IEEE Globecom"},{"key":"2","first-page":"9554","author":"rommel torres","year":"0","journal-title":"A Management Ad Hoc Networks Model for Rescue and Emergency Scenarios"},{"key":"1","first-page":"24","article-title":"Ad hoc mobile wireless networks: Principles protocols, and applications","author":"sakar","year":"2008","journal-title":"Auerbach Publications"},{"key":"10","author":"arvind ramrekha","year":"2011","journal-title":"Energy Efficient and Scalable Routing Protocol for Extreme Emergency Ad Hoc Communications"},{"key":"7","article-title":"An adaptive qos routing solution for manet based multimedia communications in emergency cases","author":"arvind ramrekha","year":"2012","journal-title":"Article First International ICST Conference"},{"key":"6","article-title":"Evaluation of manet routing protocols in a realistic emergency response scenario","author":"raffelsberger","year":"2012","journal-title":"Article 10th International Workshop on Intelligent Solutions in Embedded Systems"},{"key":"5","article-title":"Cluster based routing protocol (cbrp) functional specification internet draft","author":"jiang","year":"1999","journal-title":"MANET working group"},{"key":"4","article-title":"Energy efficient and scalable routing protocol for extreme emergency ad hoc communications","author":"ramrekha","year":"2010","journal-title":"Mobile Networks andApplications"},{"key":"9","article-title":"Adaptive and secure routing protocol for emergency mobile ad hoc networks","author":"emmanouil","year":"2010","journal-title":"International Journal of Wireless &amp; Mobile Networks"},{"key":"8","author":"ramrekha","year":"0","journal-title":"ChaMeLeon (CML) A Hybrid and Adaptive Routing Protocol for Emergency Situations"}],"event":{"name":"2014 1st International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","location":"Algiers, Algeria","start":{"date-parts":[[2014,3,24]]},"end":{"date-parts":[[2014,3,25]]}},"container-title":["2014 1st International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6906580\/6917772\/06918582.pdf?arnumber=6918582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:25:11Z","timestamp":1498155911000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6918582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ict-dm.2014.6918582","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}