{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:15:10Z","timestamp":1730272510252,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/iscc.2008.4625667","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T19:09:41Z","timestamp":1221764981000},"page":"254-259","source":"Crossref","is-referenced-by-count":0,"title":["An analysis of ASMA performances against packet dropping attacks in dense networks"],"prefix":"10.1109","author":[{"given":"Vincent","family":"Toubiana","sequence":"first","affiliation":[]},{"given":"Houda","family":"Labiod","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Reynaud","sequence":"additional","affiliation":[]},{"given":"Yvan","family":"Gourhant","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2007.4390873"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"7","first-page":"1403","article-title":"singhal, m.; \"doa: dsr over aodv routing for mobile ad hoc networks\" mobile computing","volume":"5","author":"bai","year":"2006","journal-title":"IEEE Trans"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208679"},{"key":"5","first-page":"269","article-title":"performance analysis of secure multipath routing protocols for mobile ad hoc networks","volume":"wwic 2005","author":"mavropodi","year":"2005","journal-title":"LNCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610547"},{"year":"0","key":"9"},{"key":"8","first-page":"2007","article-title":"an adaptive security framework for ad hoc networks asma: towards secure adaptive multipath in manets","volume":"ntms 2007","author":"toubiana","year":"0","journal-title":"in Proc"},{"journal-title":"ns notes and documentation","year":"1998","author":"fall","key":"11"}],"event":{"name":"2008 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2008,7,6]]},"location":"Marrakech","end":{"date-parts":[[2008,7,9]]}},"container-title":["2008 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607772\/4625572\/04625667.pdf?arnumber=4625667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T00:16:28Z","timestamp":1555632988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4625667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iscc.2008.4625667","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}