{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:17Z","timestamp":1750306937713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,12]]},"DOI":"10.1145\/2390317.2390324","type":"proceedings-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T16:42:56Z","timestamp":1352306576000},"page":"40-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)"],"prefix":"10.1145","author":[{"given":"Jared","family":"Oluoch","sequence":"first","affiliation":[{"name":"Oakland University, Rochester, MI"}]},{"given":"Huirong","family":"Fu","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI"}]},{"given":"Astrid","family":"Younang","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI"}]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[{"name":"Cleveland State University, Cleveland, OH"}]},{"given":"Bao","family":"Tri-Tran","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI"}]}],"member":"320","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"volume-title":"Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. 2003 International Conference on Wireless Networks (ICWN'03)","author":"Ramaswamy S.","key":"e_1_3_2_1_1_1"},{"volume-title":"Enhancing Unlinkability in Vehicular Ad Hoc Networks. In Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI)","year":"2011","author":"Weerasinghe H.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/65.806983"},{"volume-title":"Helsinki University of Technology","year":"2000","author":"Lundberg J.","key":"e_1_3_2_1_4_1"},{"volume-title":"Wiley and Sons","year":"2011","author":"Obaida M.","key":"e_1_3_2_1_5_1"},{"volume-title":"Proceedings of the network and distributed system security symposium (NDSS)","year":"2004","author":"Hu L.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proceedings of 26th IEEE International Conference on Computer Communication, INFOCOM 2007, 107--115","author":"Maheshwari R.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.4108\/ICST.MOBIMEDIA2009.7292"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/ICNS.2009.96"},{"doi-asserted-by":"crossref","unstructured":"C. E. Perkins. E. M. Belding-Royer. and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 July 2003   C. E. Perkins. E. M. Belding-Royer. and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 July 2003","key":"e_1_3_2_1_10_1","DOI":"10.17487\/rfc3561"},{"unstructured":"Matlab to automatically create a wireless network. http:\/\/www.edaboard.com\/thread160629.html  Matlab to automatically create a wireless network. http:\/\/www.edaboard.com\/thread160629.html","key":"e_1_3_2_1_11_1"},{"unstructured":"A Matlab Code For Random Waypoint in MANET. http:\/\/stackoverflow.com\/questions\/3715648\/a-matlab-code-for-random-way-point-in-manet  A Matlab Code For Random Waypoint in MANET. http:\/\/stackoverflow.com\/questions\/3715648\/a-matlab-code-for-random-way-point-in-manet","key":"e_1_3_2_1_12_1"},{"unstructured":"A. Hadi. and Z. A. Zukarnain. 2009. Perfomance Comparison of AODV DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks. European Journal of Scientific Research. (31) (4). 2009.  A. Hadi. and Z. A. Zukarnain. 2009. Perfomance Comparison of AODV DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks. European Journal of Scientific Research. (31) (4). 2009.","key":"e_1_3_2_1_13_1"},{"unstructured":"N. S. M. Usop. A. Abdullah. and A.F.A. Abidin. 2009. Perfomance Evaluation of AODV DSDV & DSR Routing Protocol in Grid Environment. IJCSNS International Journal of Computer Science and Network Security. (9) (7).2009.  N. S. M. Usop. A. Abdullah. and A.F.A. Abidin. 2009. Perfomance Evaluation of AODV DSDV & DSR Routing Protocol in Grid Environment. IJCSNS International Journal of Computer Science and Network Security. (9) (7).2009.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of International Conference on Multi Media and Computer Systems. ICMCS.","year":"2009","author":"Bentaout H.","key":"e_1_3_2_1_15_1"},{"unstructured":"A. Goel. and A. Sharma. 2009. Perfomance Analysis of Mobile Ad-Hoc Network using AODV Protocol. (3) (5). Pp 334--447. 2009.  A. Goel. and A. Sharma. 2009. Perfomance Analysis of Mobile Ad-Hoc Network using AODV Protocol. (3) (5). Pp 334--447. 2009.","key":"e_1_3_2_1_16_1"},{"volume-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists. 2010","year":"2010","author":"Mistry N.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/ICCIMA.2007.240"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/IAS.2009.78"},{"key":"e_1_3_2_1_20_1","article-title":"2010","volume":"4","author":"Jaisankar N.","year":"2010","journal-title":"In Proceedings of International Journal of Engineering and Technology EIACASIT. (2)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/WCSE.2009.787"},{"volume-title":"Network and Distrib. Sys. Sec. Symp.","year":"2004","author":"Hu L.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/JSAC.2005.861394"}],"event":{"sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"InfoSecCD'12","name":"InfoSecCD'12: Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 2012 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2390317.2390324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:46Z","timestamp":1750235746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":23,"alternative-id":["10.1145\/2390317.2390324","10.1145\/2390317"],"URL":"https:\/\/doi.org\/10.1145\/2390317.2390324","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"2012-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}