{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:34:27Z","timestamp":1729661667375,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/rndm.2015.7325226","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:12:08Z","timestamp":1447351928000},"page":"174-180","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic source routing under attacks"],"prefix":"10.1109","author":[{"given":"Mohamed A.","family":"Abdelshafy","sequence":"first","affiliation":[]},{"given":"Peter J. B.","family":"King","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref11","first-page":"139","article-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","author":"johnson","year":"2001","journal-title":"Ad Hoc Networking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.156"},{"key":"ref13","article-title":"Security attacks in MANET - a review","author":"kumar","year":"2012","journal-title":"IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011"},{"key":"ref14","first-page":"7","article-title":"A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks","volume":"2","author":"manikandan","year":"2011","journal-title":"IJACSA - International Journal of Advanced Computer Science and Applications"},{"journal-title":"The Network Simulator ns-2","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514256"},{"key":"ref18","first-page":"90","article-title":"Ad-hoc on-demand distance vector routing","author":"perkins","year":"1997","journal-title":"Proceedings of the 2nd IEEE workshop on Mobile Computing Systems and Applications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940916"},{"key":"ref3","first-page":"14","article-title":"Resisting flooding attacks on AODV","author":"abdelshafy","year":"2014","journal-title":"8th International Conference on Emerging Security Information Systems and Technologies (SECURWARE)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5120\/1439-1947","article-title":"A literature review of security attack in mobile ad-hoc networks","volume":"9","author":"goyal","year":"2010","journal-title":"International Journal of Computer Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345952"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.037666"},{"key":"ref2","first-page":"318","article-title":"AODV & SAODV under attack:performance comparison","author":"abdelshafy","year":"2014","journal-title":"ADHOC-NOW 2014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2013.6750209"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501418"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/ACCT.2012.112","article-title":"The black-hole node attack in T","author":"sharma","year":"2012","journal-title":"Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies ACCT '12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508283"},{"key":"ref21","article-title":"Security attacks in mobile adhoc networks","author":"singh","year":"2012","journal-title":"IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/581291.581312"}],"event":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","start":{"date-parts":[[2015,10,5]]},"location":"Munich, Germany","end":{"date-parts":[[2015,10,7]]}},"container-title":["2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311668\/7324297\/07325226.pdf?arnumber=7325226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:33:05Z","timestamp":1498246385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7325226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/rndm.2015.7325226","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}