{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:57:42Z","timestamp":1769738262971,"version":"3.49.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1109\/wincom55661.2022.9966457","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T03:22:13Z","timestamp":1670383333000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Review on Machine Learning Based Intrusion Detection for MANET Security"],"prefix":"10.1109","author":[{"given":"Wafa","family":"Bouassaba","sequence":"first","affiliation":[{"name":"Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco"}]},{"given":"Abdellah","family":"Nabou","sequence":"additional","affiliation":[{"name":"LISI Laboratory, Cadi Ayyad University Marrakech,Faculty of Sciences Semlalia,Marrakech,Morocco"}]},{"given":"Mohammed","family":"Ouzzif","sequence":"additional","affiliation":[{"name":"Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.066"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4018\/IJRQEH.289176"},{"key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7150-9_39"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.vl0i3.pp2701-2709"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.160834"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1802\/4\/042029"},{"key":"ref36","first-page":"13","author":"sivanesan","year":"0","journal-title":"A MACHINE LEARNING APPROACH TO DETECT NETWORK LAYER ATTACKS IN MOBILE AD HOC NETWORKS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.066"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149443"},{"key":"ref40","first-page":"13","author":"sivanesan","year":"0","journal-title":"A MACHINE LEARNING APPROACH TO DETECT NETWORK LAYER ATTACKS IN MOBILE AD HOC NETWORKS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8814141"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106185"},{"key":"ref13","year":"2022","journal-title":"Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition I SpringerLink"},{"key":"ref14","author":"o'shea","year":"2015","journal-title":"An Introduction to Convolutional Neural Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46719\/dsa202130512"},{"key":"ref16","article-title":"Detecting black hole attacks in MANET using relieff classification algorithm","author":"firas","year":"2022","journal-title":"roceedings of the 5th International Conference on Engineering and MIS"},{"key":"ref17","author":"bjerrum","year":"2017","journal-title":"Molecular Generation with Recurrent Neural Networks (RNNs)"},{"key":"ref18","first-page":"8","article-title":"A Deep Learning Methods for Intrusion Detection Systems based Machine Learning in MANET","author":"safaa","year":"2019","journal-title":"Conference the 4th International Conference Ecole Superieure de Technologic Meknes"},{"key":"ref19","year":"2022","journal-title":"Deep learning algorithms for human activity recognition using mobile and wearable sensor networks State of the art and research challenges - ScienceDirect"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3852515"},{"key":"ref4","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref27","author":"poongothai","year":"2014","journal-title":"Intrusion Detection in Mobile AdHoc Networks using Machine Learning Approach"},{"key":"ref3","year":"2022","journal-title":"Machine Learning Based Security Solutions in MANETs State of the art approaches - IOPscience"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2375702"},{"key":"ref29","first-page":"4","author":"kaur","year":"0","journal-title":"Blackhole Prevention Techniques Using Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PhDEDITS51180.2020.9315311"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDT252288.2021.9441515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1439-0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-015-0387-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05503-9_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2016.11.018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566316"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5561816"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1028\/1\/012006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1950\/1\/012070"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1639-2"}],"event":{"name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","location":"Rabat, Morocco","start":{"date-parts":[[2022,10,26]]},"end":{"date-parts":[[2022,10,29]]}},"container-title":["2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9966415\/9966416\/09966457.pdf?arnumber=9966457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:36:02Z","timestamp":1672083362000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9966457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/wincom55661.2022.9966457","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]}}}