{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:27:54Z","timestamp":1729646874025,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/wd.2012.6402811","type":"proceedings-article","created":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T19:28:28Z","timestamp":1357759708000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Accurate detection of black holes in MANETs using collaborative bayesian watchdogs"],"prefix":"10.1109","author":[{"given":"Manuel D.","family":"Serrat-Olmos","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Hernandez-Orallo","sequence":"additional","affiliation":[]},{"given":"Juan-Carlos","family":"Cano","sequence":"additional","affiliation":[]},{"given":"Carlos T.","family":"Calafate","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Manzoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Advanced detection of selfish or malicious nodes in ad hoc networks","author":"kargl","year":"2004","journal-title":"Proceedings of the First European Conference on Security in Ad-Hoc and Sensor Networks (ESAS 2004)"},{"key":"2","article-title":"Modeling the behavior of selfish forwarding nodes to stimulate cooperation in manet","volume":"2","author":"sundarajan","year":"2010","journal-title":"Ternational Journal of Network Security and Its Applications (IJNSA)"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/INFCOM.2010.5462263"},{"key":"1","article-title":"The controversy of selfish nodes in ad hoc networks","author":"toh","year":"2010","journal-title":"Proceedings of the Twelveth International Conference on Advanced Communication Technology (ICACT'10)"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of the Sixth International Conference on Mobile Computing and Networking (MobiCom'00)"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/CSCWD.2006.253072"},{"key":"4","article-title":"Watchdog intrusion detection systems: Are they feasible in manets?","author":"hortelano","year":"2010","journal-title":"XXI Jornadas de Paralelismo (CEDI'2010)"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.peva.2005.07.018"},{"key":"8","first-page":"543","article-title":"Black-hole attacks in p2p mobile networks discovered through bayesian filters","author":"hortelano","year":"2010","journal-title":"Proceedings of OTM Workshops'2010"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/TVT.2011.2149552"}],"event":{"name":"2012 IFIP Wireless Days (WD)","start":{"date-parts":[[2012,11,21]]},"location":"Dublin, Ireland","end":{"date-parts":[[2012,11,23]]}},"container-title":["2012 IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6387977\/6402798\/06402811.pdf?arnumber=6402811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:26:05Z","timestamp":1498008365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6402811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wd.2012.6402811","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}