{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:35:51Z","timestamp":1762032951367,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T00:00:00Z","timestamp":1289174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,8]]},"DOI":"10.1145\/1967486.1967522","type":"proceedings-article","created":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T12:01:35Z","timestamp":1302609695000},"page":"216-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Detecting misbehaving nodes in MANETs"],"prefix":"10.1145","author":[{"given":"Nan","family":"Kang","sequence":"first","affiliation":[{"name":"Acadia University, Nova Scotia, Canada"}]},{"given":"Elhadi M.","family":"Shakshuki","sequence":"additional","affiliation":[{"name":"Acadia University, Nova Scotia, Canada"}]},{"given":"Tarek R.","family":"Sheltami","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2010,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/514151.514164"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and cooperation in wireless networks","author":"Buttyan L.","year":"2007","unstructured":"Buttyan , L. and Hubaux , J-P . 2007. Security and cooperation in wireless networks . Cambridge University Press (Aug . 2007 ) Buttyan, L. and Hubaux, J-P. 2007. Security and cooperation in wireless networks. Cambridge University Press (Aug. 2007)"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE INFOCOM","volume":"3","author":"Feeney L. M.","year":"2001","unstructured":"Feeney , L. M. and Nilsson , M . 2001. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment . In IEEE INFOCOM , 2001 . 1548--1557 vol. 3 Feeney, L. M. and Nilsson, M. 2001. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In IEEE INFOCOM, 2001. 1548--1557 vol. 3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"volume-title":"Fourth IEEE Workshop on Mobile Computing Systems and Applications. Pp. 3--13","author":"Hu Y-C.","key":"e_1_3_2_1_6_1","unstructured":"Hu , Y-C. , Johnson , D. B. and Perrig , A . 2002. SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks . In Fourth IEEE Workshop on Mobile Computing Systems and Applications. Pp. 3--13 Hu, Y-C., Johnson, D. B. and Perrig, A. 2002. SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications. Pp. 3--13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.894385"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Financial Crypto","author":"Jakobsson M.","year":"2003","unstructured":"Jakobsson , M. , Hubaux , J-P . and Buttyan , L . 2003. A micropayment scheme encouraging collaboration in multi-hop cellular networks . In Proceedings of Financial Crypto , Jan 2003 . Jakobsson, M., Hubaux, J-P. and Buttyan, L. 2003. A micropayment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Crypto, Jan 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.574.582"},{"volume-title":"Proceedings of the 42nd Internet Eng. Taskforce.","author":"Johnson D. B.","key":"e_1_3_2_1_10_1","unstructured":"Johnson , D. B. , Broch , J. , Hu , Y-C. , Jetcheva , J. and Maltz , D. A . 1998. The CMU monarch project's extensions to NS . In Proceedings of the 42nd Internet Eng. Taskforce. Johnson, D. B., Broch, J., Hu, Y-C., Jetcheva, J. and Maltz, D. A. 1998. The CMU monarch project's extensions to NS. In Proceedings of the 42nd Internet Eng. Taskforce."},{"key":"e_1_3_2_1_11_1","volume-title":"Mobile Computing. Editer by Toasz Imielinski and Hank Korth","author":"Johnson D-B","year":"1996","unstructured":"Johnson , D-B . and Maltz , D-A . 1996. Dynamic source routing in ad hoc wireless networks . In Mobile Computing. Editer by Toasz Imielinski and Hank Korth , chapter 5, 153--181. Kluwer Academic Publishers . 1996 Johnson, D-B. and Maltz, D-A. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile Computing. Editer by Toasz Imielinski and Hank Korth, chapter 5, 153--181. Kluwer Academic Publishers. 1996"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1036"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01193336"},{"volume-title":"Proceedings of IEEE International Conference on Communication. (Glasgow, Scotland, June 24--28, 2007). ICC '07.","author":"Nasser N","key":"e_1_3_2_1_15_1","unstructured":"Nasser , N and Chen , Y . 2007. Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network . In Proceedings of IEEE International Conference on Communication. (Glasgow, Scotland, June 24--28, 2007). ICC '07. Nasser, N and Chen, Y. 2007. Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network. In Proceedings of IEEE International Conference on Communication. (Glasgow, Scotland, June 24--28, 2007). ICC '07."},{"volume-title":"Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. (Texas, SA, 2002). CNDS'02.","author":"Parker J.","key":"e_1_3_2_1_16_1","unstructured":"Parker , J. , Undercoffer , J. , Pinkston , J. and Joshi , A . 2002. Secure routing for mobile ad-hoc networks . In Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. (Texas, SA, 2002). CNDS'02. Parker, J., Undercoffer, J., Pinkston, J. and Joshi, A. 2002. Secure routing for mobile ad-hoc networks. In Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. (Texas, SA, 2002). CNDS'02."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190336"},{"key":"e_1_3_2_1_18_1","article-title":"A review of current routing protocols for ad-hoc mobile wireless networks","author":"Sanzgiri K.","year":"1999","unstructured":"Sanzgiri , K. , Dahill , B. , Levine , B-N. , Shields , C. and Belding-Royer , E-M . 1999 . A review of current routing protocols for ad-hoc mobile wireless networks . Personal Communications Magazine , April 1999. Sanzgiri, K., Dahill, B., Levine, B-N., Shields, C. and Belding-Royer, E-M. 1999. A review of current routing protocols for ad-hoc mobile wireless networks. Personal Communications Magazine, April 1999.","journal-title":"Personal Communications Magazine"},{"key":"e_1_3_2_1_19_1","volume-title":"Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. International Journal of Multimedia Systems","volume":"15","author":"Sheltami T.","unstructured":"Sheltami , T. , Al-Roubaiey , A. , Shakshuki , E. and Mahmoud , A . 2009 . Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. International Journal of Multimedia Systems , Springer , vol. 15 , issue 5, 273--282. Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. 2009. Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. International Journal of Multimedia Systems, Springer, vol. 15, issue 5, 273--282."},{"key":"e_1_3_2_1_21_1","unstructured":"Wu B. Chen J. Wu J. and Cardei M. 2006. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security Xiao Y. Shen X. and Du -Z D. Net.  Wu B. Chen J. Wu J. and Cardei M. 2006. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security Xiao Y. Shen X. and Du -Z D. Net."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of Infocom'03","author":"Zhong S.","year":"2003","unstructured":"Zhong , S. , Chen , J. and Yang , Y. R . 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks . In Proceedings of Infocom'03 , San Francisco, CA, USA, March 30- April 2003 . Zhong, S., Chen, J. and Yang, Y. R. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of Infocom'03, San Francisco, CA, USA, March 30- April 2003."}],"event":{"name":"iiWAS '10: 12th International Conference on Information Integration and Web-based Applications & Services","sponsor":["IIWAS International Organization for Information Integration","Web-b Web-b","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Paris France","acronym":"iiWAS '10"},"container-title":["Proceedings of the 12th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1967486.1967522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1967486.1967522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:21Z","timestamp":1750243941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1967486.1967522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,8]]},"references-count":22,"alternative-id":["10.1145\/1967486.1967522","10.1145\/1967486"],"URL":"https:\/\/doi.org\/10.1145\/1967486.1967522","relation":{},"subject":[],"published":{"date-parts":[[2010,11,8]]},"assertion":[{"value":"2010-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}