{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:40:28Z","timestamp":1730302828672,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/vetecs.2006.1682923","type":"proceedings-article","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T21:17:52Z","timestamp":1157750272000},"page":"742-746","source":"Crossref","is-referenced-by-count":2,"title":["Design of a Joint Defense System for Mobile Ad Hoc Networks"],"prefix":"10.1109","volume":"2","author":[{"given":"H.","family":"Ferng","sequence":"first","affiliation":[]},{"family":"Chien-Liang Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501464"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"15","first-page":"1268","article-title":"A security scheme for routingin ad hoc networks","author":"venkatraman","year":"2000","journal-title":"Proc IEEE WCNC '00"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986876"},{"article-title":"The nature of statistical learning theory. springer","year":"1995","author":"vapnik","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"12","article-title":"The resurrecting ducking: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"Proc International Workshop on Security Protocols"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.123"},{"key":"20","first-page":"545","article-title":"Intrusion detection techniques for mobile wireless networks","volume":"9","author":"zhang","year":"2003","journal-title":"Proc ACM WINET '03"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC.2001.957123"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2003.1192972"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/KMN.2002.1115178"},{"journal-title":"Light","year":"0","author":"joachims","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2005.1436049"},{"key":"4","first-page":"2147","article-title":"SVM-based intrusion detection system for wireless ad hoc networks","volume":"3","author":"deng","year":"2003","journal-title":"Proc IEEE VTC 03"},{"journal-title":"The network simulator - ns-2","year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2006 IEEE 63rd Vehicular Technology Conference","location":"Melbourne, Australia"},"container-title":["2006 IEEE 63rd Vehicular Technology Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11096\/35442\/01682923.pdf?arnumber=1682923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:31:13Z","timestamp":1489599073000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1682923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/vetecs.2006.1682923","relation":{},"subject":[]}}