{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T08:25:15Z","timestamp":1761985515384,"version":"build-2065373602"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/scvt.2014.7046699","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:25:34Z","timestamp":1424737534000},"page":"7-12","source":"Crossref","is-referenced-by-count":15,"title":["Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers"],"prefix":"10.1109","author":[{"given":"M.","family":"Rmayti","sequence":"first","affiliation":[]},{"given":"Y.","family":"Begriche","sequence":"additional","affiliation":[]},{"given":"R.","family":"Khatoun","sequence":"additional","affiliation":[]},{"given":"L.","family":"Khoukhi","sequence":"additional","affiliation":[]},{"given":"D.","family":"Gaiti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Le choix Bayesien. Principes et pratiques","year":"2006","author":"robert","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-92407-6","article-title":"A First Course in Bayesian Statistical Methods","author":"hoff","year":"2009"},{"key":"ref12","article-title":"A bayesian approach to filtering junk E-mail","author":"sahami","year":"0","journal-title":"AMI Technical Report WS-98-05"},{"journal-title":"Learning to Filter Spam E-mail A Comparison of a Naive Bayesian and a Memory-based Approach","year":"2000","author":"androutsopoulos","key":"ref13"},{"journal-title":"Dpraodv A Dynamic Learning System Against Blackhole Attack in Aodv Based Manet","year":"2009","author":"raj","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986560"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FGCN.2007.184"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.comcom.2010.08.007","article-title":"Mi-Y Suo Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems","volume":"34","year":"2011","journal-title":"Computer Communications"},{"key":"ref8","first-page":"338","article-title":"Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method","volume":"5","author":"kurosawa","year":"2007","journal-title":"International Journal of Network Security"},{"key":"ref7","first-page":"337","article-title":"Detection\/removal of cooperative black and gray hole attack in mobile ad-hoc networks","author":"banerjee","year":"2008","journal-title":"World Congress on Engineering and Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.070536"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2011.6026717"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.7"}],"event":{"name":"2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT)","start":{"date-parts":[[2014,11,10]]},"location":"Delft, Netherlands","end":{"date-parts":[[2014,11,10]]}},"container-title":["2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7030277\/7046694\/07046699.pdf?arnumber=7046699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:06:31Z","timestamp":1498197991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7046699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/scvt.2014.7046699","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}