{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275631,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905291","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET"],"prefix":"10.1145","author":[{"given":"Divya","family":"Patidar","sequence":"first","affiliation":[{"name":"Department of information technology, Shri Vaishnav Institute of Technology and Science Indore (MP), India"}]},{"given":"Jigyasu","family":"Dubey","sequence":"additional","affiliation":[{"name":"Department of information technology, Shri Vaishnav Institute of Technology and Science Indore (MP), India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"VOL. 9 No.","author":"Garg Nishu","year":"2009","unstructured":"Nishu Garg , R.P. Mahapatra \"MANET Security Issues\" , IJCSNS International Journal of Computer Science and Network Security , VOL. 9 No. 8, August 2009 . Nishu Garg, R.P.Mahapatra \"MANET Security Issues\", IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 8, August 2009."},{"key":"e_1_3_2_1_2_1","first-page":"2","volume":"2250","author":"Shivahare Basu Dev","year":"2012","unstructured":"Basu Dev Shivahare , Charu Wahi , Shalini Shivhare \" Comparison Of Proactive And Reactive Routing Protocols In Mobile Adhoc Network Using Routing Protocol property\", International Journal of Emerging Technology and Advanced Engineering , ISSN 2250-2459 , Volume 2 , Issue 3, March 2012 . Basu Dev Shivahare, Charu Wahi, Shalini Shivhare \" Comparison Of Proactive And Reactive Routing Protocols In Mobile Adhoc Network Using Routing Protocol property\", International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 3, March 2012.","journal-title":"ISSN"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume":"2349","author":"Saini Pardeep","year":"2014","unstructured":"Pardeep Saini , Ravinder Chouhan \" An Analysis For Recognition And confiscation Of Black Hole In MANETS\", International Journal of Innovative Research in Advanced Engineering (IJIRAE) , ISSN : 2349-2163 , Volume 1 , Issue 5 ( June 2014 ). Pardeep Saini, Ravinder Chouhan \"An Analysis For Recognition And confiscation Of Black Hole In MANETS\", International Journal of Innovative Research in Advanced Engineering (IJIRAE), ISSN: 2349-2163, Volume 1, Issue 5 (June 2014).","journal-title":"ISSN"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"382","volume":"1","author":"Nallamala Mr.","unstructured":"Mr. Nallamala Sr i Hari, Dr. N. Srinivas Rao , Dr. N. Satyanarayana \"A Novel Routing Attack in Mobile Ad Hoc Networks\" , Indian Journal of Computer Science and Engineering Vol. 1 No. 4 382 -- 391 . Mr. Nallamala Sri Hari, Dr. N. Srinivas Rao, Dr. N. Satyanarayana \"A Novel Routing Attack in Mobile Ad Hoc Networks\", Indian Journal of Computer Science and Engineering Vol. 1 No. 4 382--391.","journal-title":"Indian Journal of Computer Science and Engineering"},{"key":"e_1_3_2_1_6_1","first-page":"1530","volume-title":"Parallel Processing Workshops","author":"Lee Seungjoon","year":"2002","unstructured":"Seungjoon Lee , Bohyung Han , Minho Shin \" Robust Routing in Wireless Ad Hoc Networks\" , Parallel Processing Workshops , 2002 ISSN: 1530 - 2016 . Seungjoon Lee, Bohyung Han, Minho Shin \"Robust Routing in Wireless Ad Hoc Networks\", Parallel Processing Workshops, 2002 ISSN: 1530-2016."},{"key":"e_1_3_2_1_7_1","unstructured":"Fatemeh Barani \"A Hybrid Approach for Dynamic Intrusion Detectionin Ad Hoc Networks Using Genetic Algorithm and Artificial Immune System\" 978-1-4799-3351-8\/14\/$31.00 \u00a92014 IEEE.  Fatemeh Barani \"A Hybrid Approach for Dynamic Intrusion Detectionin Ad Hoc Networks Using Genetic Algorithm and Artificial Immune System\" 978-1-4799-3351-8\/14\/$31.00 \u00a92014 IEEE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Security, Privacy and Trust Management vol 2, No","author":"Dr.","year":"2013","unstructured":"Bhuvaneshwari, Dr. A. Francis Saviour Devaraj \"PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET \", International Journal of Security, Privacy and Trust Management vol 2, No 3, June 2013 Bhuvaneshwari, Dr. A. Francis Saviour Devaraj \"PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET\", International Journal of Security, Privacy and Trust Management vol 2, No 3, June 2013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":10,"alternative-id":["10.1145\/2905055.2905291","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905291","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}