{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:21Z","timestamp":1750307781989,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,22]],"date-time":"2007-10-22T00:00:00Z","timestamp":1193011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,22]]},"DOI":"10.1145\/1298239.1298259","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Methodologies and frameworks for testing ids in adhoc networks"],"prefix":"10.1145","author":[{"given":"Marko","family":"Jahnke","sequence":"first","affiliation":[{"name":"Research Institute for Communication, Wachtberg, Germany"}]},{"given":"Jens","family":"Toelle","sequence":"additional","affiliation":[{"name":"Research Institute for Communication, Wachtberg, Germany"}]},{"given":"Alexander","family":"Finkenbrink","sequence":"additional","affiliation":[{"name":"Research Institute for Communication, Wachtberg, Germany"}]},{"given":"Alexander","family":"Wenzel","sequence":"additional","affiliation":[{"name":"Research Institute for Communication, Wachtberg, Germany"}]},{"given":"Elmar","family":"Gerhards-Padilla","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"given":"Nils","family":"Aschenbruck","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"given":"Peter","family":"Martini","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974078"},{"key":"e_1_3_2_1_2_1","unstructured":"Ad hoc Protocol Evaluation testbed (APE) Project Documentation 2002.  Ad hoc Protocol Evaluation testbed (APE) Project Documentation 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319710"},{"key":"e_1_3_2_1_4_1","volume-title":"Naval Research Laboratory","author":"Chao W.","year":"2003","unstructured":"W. Chao , J. Macker , and J. Weston . The NRL Mobile Network Emulator. Technical report , Naval Research Laboratory , 2003 . W. Chao, J. Macker, and J. Weston. The NRL Mobile Network Emulator. Technical report, Naval Research Laboratory, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_3_2_1_6_1","volume-title":"IBM Research","author":"Debar H.","year":"1998","unstructured":"H. Debar , M. Dacier , A. Wespi , and S. Lampart . An Experimentation Workbench for Intrusion Detection Systems. Technical report , IBM Research , 1998 . H. Debar, M. Dacier, A. Wespi, and S. Lampart. An Experimentation Workbench for Intrusion Detection Systems. Technical report, IBM Research, 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 5th Int. Conference and Exhibition on The Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM'2000)","author":"Gray R.","year":"2000","unstructured":"R. Gray . Soldiers, Agents and Wireless Networks : A Report on a Military Application . In Proc. of the 5th Int. Conference and Exhibition on The Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM'2000) , 2000 . R. Gray. Soldiers, Agents and Wireless Networks: A Report on a Military Application. In Proc. of the 5th Int. Conference and Exhibition on The Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM'2000), 2000."},{"key":"e_1_3_2_1_8_1","volume-title":"Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms. Technical report","author":"Gray R.","year":"2004","unstructured":"R. Gray , D. Kotz , C. Newport , N. Dubrovsky , A. Fiske , J. Liu , C. Masone , S. McGrath , and Y. Yuan . Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms. Technical report , Dartmouth College , Computer Science , 2004 . R. Gray, D. Kotz, C. Newport, N. Dubrovsky, A. Fiske, J. Liu, C. Masone, S. McGrath, and Y. Yuan. Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms. Technical report, Dartmouth College, Computer Science, 2004."},{"key":"e_1_3_2_1_9_1","unstructured":"C. Iheagwara and A. Blyth. Evaluation of ID systems in a switched and distributed environment: the RealSecure case study. Computer Networks 32.   C. Iheagwara and A. Blyth. Evaluation of ID systems in a switched and distributed environment: the RealSecure case study. Computer Networks 32."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of 1st Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing","author":"Karygiannis A.","year":"2005","unstructured":"A. Karygiannis and E. Antonakakis . mLab: A Mobile Ad Hoc Network Test Bed . In Proc. of 1st Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing , Santorini, Greece , 2005 . A. Karygiannis and E. Antonakakis. mLab: A Mobile Ad Hoc Network Test Bed. In Proc. of 1st Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Santorini, Greece, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2002.993531"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.38"},{"key":"e_1_3_2_1_14_1","volume-title":"Network based intrusion detection: A review of technologies. Computers &amp","author":"Richards K.","year":"1999","unstructured":"K. Richards . Network based intrusion detection: A review of technologies. Computers &amp ; Security , 18, 1999 . K. Richards. Network based intrusion detection: A review of technologies. Computers &amp; Security, 18, 1999."},{"key":"e_1_3_2_1_15_1","volume-title":"Wachtberg","author":"Riechmann C.","year":"2006","unstructured":"C. Riechmann . MANET Forwarding Protocol (MFP) for Multicast and Unicast Traffic. Technical report , Wachtberg , Germany , 2006 . C. Riechmann. MANET Forwarding Protocol (MFP) for Multicast and Unicast Traffic. Technical report, Wachtberg, Germany, 2006."}],"event":{"name":"MSWiM07: 10th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Chania Crete Island Greece","acronym":"MSWiM07"},"container-title":["Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298239.1298259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298239.1298259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:08Z","timestamp":1750254968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298239.1298259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,22]]},"references-count":15,"alternative-id":["10.1145\/1298239.1298259","10.1145\/1298239"],"URL":"https:\/\/doi.org\/10.1145\/1298239.1298259","relation":{},"subject":[],"published":{"date-parts":[[2007,10,22]]},"assertion":[{"value":"2007-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}