{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:46:15Z","timestamp":1729633575939,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/softcom.2016.7772109","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T16:40:15Z","timestamp":1482165615000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["A packet traversal time per hop based adaptive wormhole detection algorithm for MANETs"],"prefix":"10.1109","author":[{"given":"Jonny","family":"Karlsson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Goran","family":"Pulkkis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laurence S.","family":"Dooley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s111211122"},{"key":"ref11","article-title":"WAD-HLA: Wormhole Attack Detection Using Hop Latency And Adjoining Node Analysis in MANET","volume":"2","author":"vandana","year":"2013","journal-title":"International Journal of Engineering Research & Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.81"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753176"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s90605022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/1266761"},{"journal-title":"Exploratory Data Analysis Reading","year":"1977","author":"tukey","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1021\/ac60052a025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1021\/ac00002a010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.267"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref6","article-title":"DelPHI: Wormhole detection mechanism for ad hoc wireless networks","author":"chiu","year":"2006","journal-title":"ISWPC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.070536"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2007.122"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.49"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"369","DOI":"10.28945\/1628","article-title":"Routing security in mobile ad-hoc networks","volume":"9","author":"karlsson","year":"2012","journal-title":"Issues in Informing Sci and Inform Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.019"},{"key":"ref1","first-page":"41","article-title":"A survey of routing attacks and security measures in mobile ad-hoc networks","volume":"3","author":"agrawal","year":"2011","journal-title":"Journal of Computing"},{"key":"ref20","first-page":"133","article-title":"Critical Values for Six Dixon Tests for Outliers in Normal Samples up to Sizes 100, and Applications in Science and Engineering","volume":"23","author":"verma","year":"2006","journal-title":"Revista Mexicana de Ciencias Geol&#x00F3;gicas"},{"year":"0","key":"ref22","article-title":"The Network Simulator - ns-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s130506651"},{"year":"0","key":"ref24","article-title":"LogiCORE IP AXI 10-Gigabit Ethernet v1.1 Product Guide for Vivado Design Suite"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"year":"0","key":"ref25","article-title":"MAX24288 IEEE 1588 Packet Timestamper and Clock and 1 Gbps Parallel to Serial MII Converter"}],"event":{"name":"2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2016,9,22]]},"location":"Split, Croatia","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7754733\/7772099\/07772109.pdf?arnumber=7772109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T14:44:33Z","timestamp":1568645073000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7772109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/softcom.2016.7772109","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}