{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:49:12Z","timestamp":1729666152014,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/noms.2008.4575164","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"425-432","source":"Crossref","is-referenced-by-count":12,"title":["Survival multipath routing for MANETs"],"prefix":"10.1109","author":[{"given":"Michele N.","family":"Lima","sequence":"first","affiliation":[]},{"given":"Helber W.","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Aldri L.","family":"dos Santos","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2005.12.007"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497929"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1143549.1143605"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.249"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513802"},{"key":"14","first-page":"3201","article-title":"split multipath routing with maximally disjoint paths in ad hoc networks","author":"lee","year":"2001","journal-title":"IEEE ICC"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570685"},{"key":"12","first-page":"209","article-title":"multipath routing in mobile ad hoc networks: issues and challenges","author":"mueller","year":"2003","journal-title":"MASCOTS tutorials"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.21236\/ADA341963","author":"ellison","year":"1997","journal-title":"Survivable network systems An emerging discipline - CMU\/SEI-97-TR-013"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.860094"},{"key":"23","first-page":"468","article-title":"an adaptive genetic fuzzy multipath routing protocol for wireless ad hoc networks","author":"liu","year":"2005","journal-title":"SNPD\/SAWN"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255116"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/2.53"},{"journal-title":"Neural Network and Fuzzy Logic Applications in C\/C","year":"1994","author":"welstead","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.798"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/581291.581312"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501464"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","article-title":"a survey of security issues in mobile ad hoc and sensor networks","volume":"7","author":"djenouri","year":"2005","journal-title":"Communications Surveys & Tutorials IEEE"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354662"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838598"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941318"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424871"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.7"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium - Pervasive Management for Ubiquitous Networks and Services","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575164.pdf?arnumber=4575164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T01:31:49Z","timestamp":1557797509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4575164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575164","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}