{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:30Z","timestamp":1774369350939,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/tvt.2008.2010049","type":"journal-article","created":{"date-parts":[[2008,12,4]],"date-time":"2008-12-04T16:13:10Z","timestamp":1228407190000},"page":"2471-2481","source":"Crossref","is-referenced-by-count":82,"title":["A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks"],"prefix":"10.1109","volume":"58","author":[{"given":"H.","family":"Nakayama","sequence":"first","affiliation":[]},{"given":"S.","family":"Kurosawa","sequence":"additional","affiliation":[]},{"given":"A.","family":"Jamalipour","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Nemoto","sequence":"additional","affiliation":[]},{"given":"N.","family":"Kato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/49.779925"},{"key":"ref38","first-page":"322","article-title":"impact of mobility metric on routing protocols for mobile ad hoc networks","author":"tsumochi","year":"2003","journal-title":"Proc IEEE Pacific Rim Conf Commun Comput Signal Process PACRIM"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986876"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"ref30","first-page":"73","article-title":"robust routing in wireless ad hoc networks","author":"lee","year":"2002","journal-title":"Proc 31st ICPP Workshops"},{"key":"ref37","author":"duda","year":"1973","journal-title":"Pattern Classification and Scene Analysis"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1379027"},{"key":"ref35","first-page":"125","article-title":"attack analysis and detection for ad hoc routing protocols","author":"huang","year":"2004","journal-title":"Proc 7th Int Symp RAID"},{"key":"ref34","first-page":"478","article-title":"cross-feature analysis for detecting ad-hoc routing anomalies","author":"huang","year":"2003","journal-title":"Proc 21st ICDCS"},{"key":"ref10","first-page":"410","article-title":"a network-based anomaly detection system using multiple network features","author":"waizumi","year":"2007","journal-title":"Proc 3rd Int Conf WEBIST"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/98.904895"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1037\/10011-000"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/h0058996"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232402"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2003.1191259"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313244"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"ref17","year":"0","journal-title":"Network SimulatorNS (ver 2)"},{"key":"ref18","author":"zapata","year":"2006","journal-title":"Secure ad hoc on-demand distance vector (SAODV) routing"},{"key":"ref19","year":"0","journal-title":"A-SAODV Homepage"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941318"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842555"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref8","author":"toh","year":"2002","journal-title":"Ad-Hoc Mobile and Wireless Networks"},{"key":"ref7","author":"edney","year":"2004","journal-title":"Real 802 11 Security Wi-Fi Protected Access 802 11i"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610547"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473093"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494597"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref42","author":"golub","year":"1996","journal-title":"Johns Hopkins Studies in the Mathematical Sciences"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","article-title":"ariadne: a secure on-demand routing protocol for ad hoc networks","volume":"11","author":"yih-chun","year":"2005","journal-title":"Wirel Netw"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.10.038"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"ref43","author":"chakeres","year":"2007","journal-title":"Dynamic MANET on-demand (DYMO) routing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/4912580\/04689379.pdf?arnumber=4689379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:59:54Z","timestamp":1633910394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4689379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2008.2010049","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}