{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:12Z","timestamp":1750307172377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393283","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"396-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Cross-layer IDS for Rushing attack in Wireless Mesh Networks"],"prefix":"10.1145","author":[{"given":"K. Ganesh","family":"Reddy","sequence":"first","affiliation":[{"name":"NITK, Surathkal"}]},{"given":"P. Santhi","family":"Thilagam","sequence":"additional","affiliation":[{"name":"NITK, Surathkal"}]},{"given":"Bommena Nageswara","family":"Rao","sequence":"additional","affiliation":[{"name":"NITK, Surathkal"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the IEEE Radio Communication.s23--s30","author":"Ian A.","year":"2005","unstructured":"Ian , A. , Wang , X. , and Kiyon . 2005 . A Survey on Wireless Mesh Networks . In Proceedings of the IEEE Radio Communication.s23--s30 . Ian, A., Wang, X., and Kiyon. 2005. A Survey on Wireless Mesh Networks. In Proceedings of the IEEE Radio Communication.s23--s30."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume":"97","author":"Mattord","unstructured":"nitin.; Mattord , verma (2008). Principles of Information Security. Course Technology. pp. 290--301. ISBN 97 8- 1 - 4239 -0177-8. nitin.;Mattord, verma (2008). Principles of Information Security. Course Technology. pp. 290--301.ISBN 978-1-4239-0177-8.","journal-title":"ISBN"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1632480"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.187"},{"volume-title":"Proceedings of ICON. IEEE, 194--199","author":"Joseph J. F. C.","key":"e_1_3_2_1_6_1","unstructured":"Joseph , J. F. C. , Das , A. , Seet , B. C. , and Lee , B. S . 2007. Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs . In Proceedings of ICON. IEEE, 194--199 . Joseph, J. F. C., Das, A., Seet, B. C., and Lee, B. S. 2007. Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs. In Proceedings of ICON. IEEE, 194--199."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.460"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceeding of the IEEE International Conference in Mobile Adhoc and Sensor Systems Conference","author":"Thamilarasu G.","year":"2005","unstructured":"Thamilarasu , G. , Balasubramanian , A. , Mishra , S. , and Sridhar R . 2005. A Cross-Layer based Intrusion Detection Approach for Wireless Ad-hoc Networks . In Proceeding of the IEEE International Conference in Mobile Adhoc and Sensor Systems Conference , 2005 . 1--8 Thamilarasu, G., Balasubramanian, A., Mishra, S., and Sridhar R. 2005. A Cross-Layer based Intrusion Detection Approach for Wireless Ad-hoc Networks. In Proceeding of the IEEE International Conference in Mobile Adhoc and Sensor Systems Conference, 2005. 1--8"},{"volume-title":"Proceedings of the IEEE -- International Conference on Signal processing, Communications and Networking. 182--188","author":"Bose S.","key":"e_1_3_2_1_9_1","unstructured":"Bose , S. and Kannan , A . 2008. Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks . In Proceedings of the IEEE -- International Conference on Signal processing, Communications and Networking. 182--188 . Bose, S. and Kannan, A. 2008. Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks. In Proceedings of the IEEE -- International Conference on Signal processing, Communications and Networking. 182--188."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2009.11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Latha T. and Sankaranarayanan V. 2006. Solution to Prevent Rushing Attack in Wireless Ad hoc Networks. IEEE 42--47. Latha T. and Sankaranarayanan V. 2006. Solution to Prevent Rushing Attack in Wireless Ad hoc Networks. IEEE 42--47.","DOI":"10.1109\/ISAHUC.2006.4290645"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.69"},{"key":"e_1_3_2_1_13_1","first-page":"451","volume-title":"Conference on Distributed Computing Systems Workshops.","author":"International","unstructured":"International Conference on Distributed Computing Systems Workshops. pp 451 -- 454 . International Conference on Distributed Computing Systems Workshops. pp 451--454."},{"key":"e_1_3_2_1_14_1","first-page":"6","volume-title":"Proceedings of the IEEE CCNC.","author":"Parker J.","unstructured":"Parker , J. , Anand , P. , and Joshi , A . 2006. Cross-layer Analysis for Detecting Wireless Misbehavior . In Proceedings of the IEEE CCNC. pp 6 -- 9 . Parker, J., Anand, P., and Joshi, A. 2006. Cross-layer Analysis for Detecting Wireless Misbehavior. In Proceedings of the IEEE CCNC. pp 6--9."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.85"},{"key":"e_1_3_2_1_16_1","first-page":"927","volume-title":"Santhi (2012)","author":"Ganesh P.","year":"2012","unstructured":"Ganesh and P. Santhi (2012) Taxonomy of Network Layer Attacks in Wireless Mesh Proceedings of the Second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012 ), 167, pp 927 -- 935 Ganesh and P. Santhi (2012) Taxonomy of Network Layer Attacks in Wireless Mesh Proceedings of the Second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), 167, pp 927--935"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:47Z","timestamp":1750240487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":16,"alternative-id":["10.1145\/2393216.2393283","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393283","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}