{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:12Z","timestamp":1750221372050,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T00:00:00Z","timestamp":1521072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,15]]},"DOI":"10.1145\/3195612.3195617","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T13:57:46Z","timestamp":1528379866000},"page":"51-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A behavioural theory for intrusion detection system in mobile ad-hoc networks"],"prefix":"10.1145","author":[{"given":"Parul","family":"Yadav","sequence":"first","affiliation":[{"name":"Institute of Engineering &amp; Technology, Lucknow, Uttar Pradesh, India"}]},{"given":"Manish","family":"Gaur","sequence":"additional","affiliation":[{"name":"Centre for Advanced Studies Lucknow, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks","author":"Alilou Mehdi","year":"2005","unstructured":"Mehdi Alilou , Mehdi Dehghan .t, April 2005 , Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks , Transactions on Engineering, Computing And Technology V5 ISSN 1305--5313 Mehdi Alilou, Mehdi Dehghan.t, April 2005, Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks, Transactions on Engineering, Computing And Technology V5 ISSN 1305--5313","journal-title":"Transactions on Engineering, Computing And Technology V5 ISSN 1305--5313"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"volume-title":"Proc. IEEE INFOCOM 2004","author":"Liu W.","key":"e_1_3_2_1_3_1","unstructured":"W. Liu and Y. Fang , 2004, SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks , Proc. IEEE INFOCOM 2004 W. Liu and Y. Fang, 2004, SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, Proc. IEEE INFOCOM 2004"},{"key":"e_1_3_2_1_4_1","first-page":"1976","volume-title":"Proc. IEEE INFOCOM","volume":"3","author":"Hu Y.","year":"2003","unstructured":"Y. Hu , A. Perrig , and D. B. Johnson , Apr . 2003, Packet Leashes: A defense against Wormhole Attacks in Wireless Ad Hoc Networks , Proc. IEEE INFOCOM 2003 , vol. 3 , pp. 1976 -- 1986 . Y. Hu, A. Perrig, and D. B. Johnson, Apr. 2003, Packet Leashes: A defense against Wormhole Attacks in Wireless Ad Hoc Networks, Proc. IEEE INFOCOM 2003, vol. 3, pp. 1976--86."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"e_1_3_2_1_7_1","unstructured":"Y. Hu and A. Perrig 2004 A Survey of Secure Wireless Ad Hoc Routing IEEE Computer Society.  Y. Hu and A. Perrig 2004 A Survey of Secure Wireless Ad Hoc Routing IEEE Computer Society."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029120"},{"key":"e_1_3_2_1_9_1","first-page":"1879","volume-title":"IEEE International Conference on Communications","volume":"4","author":"Wang Wenye","year":"2006","unstructured":"Xing, Fei, and Wenye Wang , 2006 , Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes , IEEE International Conference on Communications , vol. 4 , pp. 1879 -- 1884 . Xing, Fei, and Wenye Wang, 2006, Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes, IEEE International Conference on Communications, vol. 4, pp. 1879--1884."},{"volume-title":"Licentiate thesis","author":"Lundgren Henrik","key":"e_1_3_2_1_10_1","unstructured":"Henrik Lundgren , 2002 , Implementation and Real-world Evaluation of Routing Protocols for Wireless Ad hoc Networks , Licentiate thesis , Uppsala University . Henrik Lundgren, 2002, Implementation and Real-world Evaluation of Routing Protocols for Wireless Ad hoc Networks, Licentiate thesis, Uppsala University."},{"key":"e_1_3_2_1_11_1","unstructured":"Hans Huttel Willard Thor Rafnsson Secrecy in Mobile Adhoc Networks available at http:\/\/www.cse.chalmers.se\/rafnsson\/article.pdf  Hans Huttel Willard Thor Rafnsson Secrecy in Mobile Adhoc Networks available at http:\/\/www.cse.chalmers.se\/rafnsson\/article.pdf"},{"key":"e_1_3_2_1_12_1","first-page":"25","volume-title":"International Journal of Computers and Communications, Issue 2","author":"Pura Mihai-Lica","unstructured":"Mihai-Lica Pura , Victor-Valeriu Patriciu , Ion Bica , 2009 , Modeling and formal verification of implicit ondemand secure ad hoc routing protocols in HLPSL and AVISPA , International Journal of Computers and Communications, Issue 2 , Volume 3 , pp. 25 -- 32 Mihai-Lica Pura, Victor-Valeriu Patriciu, Ion Bica, 2009, Modeling and formal verification of implicit ondemand secure ad hoc routing protocols in HLPSL and AVISPA, International Journal of Computers and Communications, Issue 2, Volume 3, pp. 25--32"},{"key":"e_1_3_2_1_13_1","unstructured":"Remy Chretien Stephanie Delaune Formal analysis of privacy for routing protocols in mobile ad hoc networks  Remy Chretien Stephanie Delaune Formal analysis of privacy for routing protocols in mobile ad hoc networks"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.100"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.11.010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. International Conference on Distributed Computing and Internet Technology","author":"Yadav Parul","year":"2015","unstructured":"Parul Yadav and Manish Gaur , 2015 , A Survey on Formal Modelling for Secure Routing in Mobile Ad hoc Networks , Proc. International Conference on Distributed Computing and Internet Technology Parul Yadav and Manish Gaur, 2015, A Survey on Formal Modelling for Secure Routing in Mobile Ad hoc Networks, Proc. International Conference on Distributed Computing and Internet Technology"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.13.11.635-647"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.036"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044731.1044735"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_3"}],"event":{"name":"HP3C 2018: 2018 2nd International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C 2018","location":"Hong Kong Hong Kong"},"container-title":["Proceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195612.3195617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195612.3195617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:34Z","timestamp":1750213594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195612.3195617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,15]]},"references-count":22,"alternative-id":["10.1145\/3195612.3195617","10.1145\/3195612"],"URL":"https:\/\/doi.org\/10.1145\/3195612.3195617","relation":{},"subject":[],"published":{"date-parts":[[2018,3,15]]},"assertion":[{"value":"2018-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}