{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:12Z","timestamp":1750221312600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,24]]},"DOI":"10.1145\/3163058.3163062","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T13:15:02Z","timestamp":1516281302000},"page":"76-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach"],"prefix":"10.1145","author":[{"given":"Khurram Gulzar","family":"Rana","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China and Quaid-i-Azam University, Islamabad, Pakistan"}]},{"given":"Cai","family":"Yongquan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China"}]},{"given":"Muhammad","family":"Azeem","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China"}]},{"given":"Allah","family":"Ditta","sequence":"additional","affiliation":[{"name":"University of Education, Township Campus, Lahore, Pakistan"}]},{"given":"Haiyang","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01845-4_39"},{"key":"e_1_3_2_1_2_1","first-page":"70","volume":"201","author":"Lim S.Y.","unstructured":"Lim , S.Y. and Y. -H. Choi , Malicious node detection using a dual threshold in wireless sensor networks. Journal of Sensor and Actuator Networks , 201 3. 2(1): p. 70 -- 84 . Lim, S.Y. and Y.-H. Choi, Malicious node detection using a dual threshold in wireless sensor networks. Journal of Sensor and Actuator Networks, 2013. 2(1): p. 70--84.","journal-title":"Actuator Networks"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3561"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2008 Spring simulation multiconference.","author":"Atakli I.M.","year":"2008","unstructured":"Atakli , I.M. , et al. Malicious node detection in wireless sensor networks using weighted trust evaluation . in Proceedings of the 2008 Spring simulation multiconference. 2008 . Society for Computer Simulation International. Atakli, I.M., et al. Malicious node detection in wireless sensor networks using weighted trust evaluation. in Proceedings of the 2008 Spring simulation multiconference. 2008. Society for Computer Simulation International."},{"key":"e_1_3_2_1_6_1","volume-title":"Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on.","author":"Gupta A.","year":"2015","unstructured":"Gupta , A. Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET . in Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. 2015 . IEEE. Gupta, A. Mitigation algorithm against black hole attack using Real Time Monitoring for AODV routing protocol in MANET. in Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. 2015. IEEE."},{"key":"e_1_3_2_1_7_1","first-page":"559","volume":"201","author":"Taheri Y.","unstructured":"Taheri , Y. , H.G. Garakani , and N. Mohammadzadeh , A Game Theory Approach for Malicious Node Detection in MANETs. J. Inf. Sci. Eng. , 201 6. 32(3): p. 559 -- 573 . Taheri, Y., H.G. Garakani, and N. Mohammadzadeh, A Game Theory Approach for Malicious Node Detection in MANETs. J. Inf. Sci. Eng., 2016. 32(3): p. 559--573.","journal-title":"MANETs. J. Inf. Sci. Eng."},{"key":"e_1_3_2_1_8_1","volume-title":"Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016 5th International Conference on.","author":"Dumne P.R.","year":"2016","unstructured":"Dumne , P.R. and A. Manjaramkar . Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs. in Reliability , Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016 5th International Conference on. 2016 . IEEE. Dumne, P.R. and A. Manjaramkar. Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs. in Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016 5th International Conference on. 2016. IEEE."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726597"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2016.7507935"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.78"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2015.7288739"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.196"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"}],"event":{"name":"ICCNS 2017: 2017 the 7th International Conference on Communication and Network Security","sponsor":["University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Tokyo Japan","acronym":"ICCNS 2017"},"container-title":["Proceedings of the 2017 7th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3163058.3163062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:38Z","timestamp":1750212818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":15,"alternative-id":["10.1145\/3163058.3163062","10.1145\/3163058"],"URL":"https:\/\/doi.org\/10.1145\/3163058.3163062","relation":{},"subject":[],"published":{"date-parts":[[2017,11,24]]},"assertion":[{"value":"2017-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}