{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T01:28:45Z","timestamp":1748914125553,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/mahss.2005.1542870","type":"proceedings-article","created":{"date-parts":[[2005,12,13]],"date-time":"2005-12-13T15:55:52Z","timestamp":1134489352000},"page":"773-780","source":"Crossref","is-referenced-by-count":6,"title":["A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks"],"prefix":"10.1109","author":[{"given":"S.","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"H.","family":"Nakayama","sequence":"additional","affiliation":[]},{"family":"Nei Kato","sequence":"additional","affiliation":[]},{"given":"A.","family":"Jamalipour","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Nemoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pattern Classification and Scene Analysis","year":"1973","author":"duda","key":"19"},{"key":"17","first-page":"478","article-title":"Cross-feature analysis for detecting ad-hoc routing anomalies","author":"an huang","year":"2003","journal-title":"International Conference on Distributed Computing System (ICDCS'03)"},{"key":"18","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-540-30143-1_7","article-title":"Attack analysis and detection for ad. hoc routing protocols","author":"an huang","year":"2004","journal-title":"International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986876"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842555"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"21","first-page":"60","article-title":"How to misuse aodv: A case study of insider attacks against mobile ad-hoc: Routing protocols","author":"niug","year":"2003","journal-title":"Proc 4th Annu IEEE Information Assurance Workshop"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1037\/10011-000"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313244"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2003.1191259"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/98.904895"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2003.1235782"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"2","first-page":"12","article-title":"Ariadne:a secure on-demand routing protocol for ad hoc networks","author":"yih-chun","year":"2002","journal-title":"The Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"1","article-title":"Secure ad hoc on-demand distance vector (SAODV) routing","author":"zapata","year":"2005","journal-title":"IETF Internet Draft"},{"key":"7","article-title":"The dynamic source routing protocol for mobile ad hoc networks (DSR)","author":"johnson","year":"2004","journal-title":"IETF Internet Draft"},{"journal-title":"UCB\/LBNL\/VINT Network Simulator - ns (version 2)","year":"0","key":"6"},{"key":"5","article-title":"Ac hoc on-demand distance vector (AODV) routing","volume":"3561","author":"perkins","year":"2003","journal-title":"RFC"},{"key":"4","first-page":"45","article-title":"Improving accuracy of network-based anomaly detection using multiple detection modules","volume":"104","author":"sato","year":"2004","journal-title":"IEICE technical report"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.2002.1017480"}],"event":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","location":"N\/A"},"container-title":["IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10355\/32951\/01542870.pdf?arnumber=1542870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:41:17Z","timestamp":1497649277000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1542870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mahss.2005.1542870","relation":{},"subject":[]}}