{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:38Z","timestamp":1762004618785,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906469","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"863-868","source":"Crossref","is-referenced-by-count":14,"title":["Cooperative cross layer detection for blackhole attack in VANET-OLSR"],"prefix":"10.1109","author":[{"given":"Raghad","family":"Baiad","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[]},{"given":"Jamal","family":"Bentahar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085413"},{"key":"17","first-page":"1","article-title":"Connectivity dynamics for vehicular ad-hoc networks in signalized road systems","author":"ho","year":"2009","journal-title":"Teletraffic Congress 2009 ITC 21 2009 21st International"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2007.4390876"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583715"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.873838"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.11.007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2008.4447185"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.441"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"2","article-title":"Prevention of cooperative black hole attack in wireless ad hoc networks.","volume":"2003","author":"ramaswamy","year":"2003","journal-title":"International Conference on Wireless Networks"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.07.003"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SDRN.2007.4348974"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.250670"},{"key":"6","article-title":"An acknowledgement-based approach for the detection of routing misbehavior in manets","volume":"1","author":"kumar","year":"2011","journal-title":"International Journal of Advances in Embedded Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.48"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198910"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906469.pdf?arnumber=6906469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:39:06Z","timestamp":1602689946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906469","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}