{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:33Z","timestamp":1750306713621,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T00:00:00Z","timestamp":1410220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,9]]},"DOI":"10.1145\/2659651.2659694","type":"proceedings-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T13:41:52Z","timestamp":1418737312000},"page":"441-446","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Identity Forging Attack in MANETs"],"prefix":"10.1145","author":[{"given":"Nishant","family":"Garg","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India 302017"}]},{"given":"Kuldeep","family":"Pareek","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India 302017"}]},{"given":"Manoj Singh","family":"Gaur","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India 302017"}]},{"given":"Vijay","family":"Laxmi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India 302017"}]},{"given":"Chhagan","family":"Lal","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India 302017"}]}],"member":"320","published-online":{"date-parts":[[2014,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3):534--541","author":"Abdelhaq M.","year":"2011","unstructured":"M. Abdelhaq , R. Hassan , M. Ismail , R. Alsaqour , and D. Israf . Detecting sleep deprivation attack over manet using a danger theory-based algorithm . International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3):534--541 , 2011 . M. Abdelhaq, R. Hassan, M. Ismail, R. Alsaqour, and D. Israf. Detecting sleep deprivation attack over manet using a danger theory-based algorithm. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3):534--541, 2011."},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"1302","article-title":"Self-regulating network utilization in mobile ad hoc wireless networks. Vehicular Technology","volume":"55","author":"Ci S.","year":"2006","unstructured":"S. Ci , M. Guizani , H.-H. Chen , and H. Sharif . Self-regulating network utilization in mobile ad hoc wireless networks. Vehicular Technology , IEEE Transactions on , 55 ( 4 ): 1302 -- 1310 , 2006 . S. Ci, M. Guizani, H.-H. Chen, and H. Sharif. Self-regulating network utilization in mobile ad hoc wireless networks. Vehicular Technology, IEEE Transactions on, 55(4):1302--1310, 2006.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.07.005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/520551.837511"},{"key":"e_1_3_2_1_8_1","unstructured":"SCALABLE NETWORK TECHNOLOGIES. http:\/\/www.scalable-networks.com\/content\/products\/exata.  SCALABLE NETWORK TECHNOLOGIES. http:\/\/www.scalable-networks.com\/content\/products\/exata."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"}],"event":{"name":"SIN '14: The 7th International Conference on Security of Information and Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SICSA The Scottish Informatics and Computer Science Alliance","University of Glasgow University of Glasgow"],"location":"Glasgow Scotland UK","acronym":"SIN '14"},"container-title":["Proceedings of the 7th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659651.2659694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:21Z","timestamp":1750231161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,9]]},"references-count":10,"alternative-id":["10.1145\/2659651.2659694","10.1145\/2659651"],"URL":"https:\/\/doi.org\/10.1145\/2659651.2659694","relation":{},"subject":[],"published":{"date-parts":[[2014,9,9]]},"assertion":[{"value":"2014-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}