{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:45:00Z","timestamp":1772754300696,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369021","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["A deep learning methods for intrusion detection systems based machine learning in MANET"],"prefix":"10.1145","author":[{"given":"Safaa","family":"Laqtib","sequence":"first","affiliation":[{"name":"Moulay Ismail University, Meknes, Morocco"}]},{"given":"Khalid El","family":"Yassini","sequence":"additional","affiliation":[{"name":"Moulay Ismail University, Meknes, Morocco"}]},{"given":"Moulay Lahcen","family":"Hasnaoui","sequence":"additional","affiliation":[{"name":"Moulay Ismail University, Meknes, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Malaysia, 22 --","author":"Amiria Ehsan","year":"2013","unstructured":"Ehsan Amiria , Hassan Keshavarz , Hossein Heidari , Esmaeil Mohamadi , Hossein Moradzadeh , \" Intrusion Detection Systems in MANET : A Review,\" ICIMTR International Conference on Innovation, Management and Technology Research , Malaysia, 22 -- 23 September , 2013 Ehsan Amiria, Hassan Keshavarz, Hossein Heidari, Esmaeil Mohamadi, Hossein Moradzadeh, \"Intrusion Detection Systems in MANET: A Review,\" ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22 -- 23 September, 2013"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Safaa Laqtib Khalid El Yassini Meriem Houmer Moulay Driss El Ouadghiri Moulay Lahcen Hasnaoui \"Impact of mobility models on Optimized Link State Routing Protocol in MANET \" Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM) 26--29 Oct. 2016.  Safaa Laqtib Khalid El Yassini Meriem Houmer Moulay Driss El Ouadghiri Moulay Lahcen Hasnaoui \"Impact of mobility models on Optimized Link State Routing Protocol in MANET \" Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM) 26--29 Oct. 2016.","DOI":"10.1109\/WINCOM.2016.7777199"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"e_1_3_2_1_4_1","unstructured":"Bing Wu Jianmin Chen Jie Wu Mihaela Cardei \"A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks \" Department of Computer Science and Engineering Florida Atlantic University WIRELESS\/MOBILE NETWORK SECURITY.  Bing Wu Jianmin Chen Jie Wu Mihaela Cardei \"A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks \" Department of Computer Science and Engineering Florida Atlantic University WIRELESS\/MOBILE NETWORK SECURITY."},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun Ismail","year":"2013","unstructured":"Ismail Butun , Salvatore D. Morgera , Ravi Sankar , \" A Survey of Intrusion Detection Systems in Wireless Sensor Networks ,\" IEEE Communications Surveys & Tutorials , Volume: 16 , Issue: 1 , 17 May 2013 Ismail Butun, Salvatore D. Morgera, Ravi Sankar, \"A Survey of Intrusion Detection Systems in Wireless Sensor Networks,\" IEEE Communications Surveys & Tutorials, Volume: 16, Issue: 1, 17 May 2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Smart Sensors and Application, IEEE.","author":"Anwar Raja Waseem","unstructured":"Raja Waseem Anwar , Majid Bakhtiari , AnazidaZainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi , \" Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks ,\" International Conference on Smart Sensors and Application, IEEE. Raja Waseem Anwar, Majid Bakhtiari, AnazidaZainal, Abdul Hanan Abdullah and Kashif Naseer Qureshi, \"Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks,\" International Conference on Smart Sensors and Application, IEEE."},{"key":"e_1_3_2_1_8_1","article-title":"An overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach","volume":"2347","author":"Ughade Saurabh","unstructured":"Saurabh Ughade , R.K. Kapoor , Ankur Pandey , \" An overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach ,\" International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue4.2014 Saurabh Ughade, R.K. Kapoor, Ankur Pandey, \"An overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach,\" International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue4.2014","journal-title":"International Journal of Recent Development in Engineering and Technology, ISSN"},{"key":"e_1_3_2_1_9_1","article-title":"A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network","author":"Pawar Mahesh","year":"2017","unstructured":"VarshaGharu, Mahesh Pawar , Jitendra Agarwal , \" A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network ,\" Indian Journal of Computer Science and Engineering (IJCSE) , 2017 VarshaGharu, Mahesh Pawar, Jitendra Agarwal, \"A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network,\" Indian Journal of Computer Science and Engineering (IJCSE), 2017","journal-title":"Indian Journal of Computer Science and Engineering (IJCSE)"},{"key":"e_1_3_2_1_10_1","article-title":"Wormhole Attack Prevention and Detection in MANETs Using HRL Method","author":"Singla Neellima","year":"2017","unstructured":"Neellima Singla , Mr. Ramanjeet Singh , \" Wormhole Attack Prevention and Detection in MANETs Using HRL Method \", International Journal of Advance Research, Ideas and Innovations in Technology , 2017 Neellima Singla, Mr. Ramanjeet Singh, \"Wormhole Attack Prevention and Detection in MANETs Using HRL Method\", International Journal of Advance Research, Ideas and Innovations in Technology, 2017","journal-title":"International Journal of Advance Research, Ideas and Innovations in Technology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sushama Singh; Atish Mishra; Upendra Singh \"Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm \" Symposium on Colossal Data Analysis and Networking (CDAN) 18--19 March 2016  Sushama Singh; Atish Mishra; Upendra Singh \"Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm \" Symposium on Colossal Data Analysis and Networking (CDAN) 18--19 March 2016","DOI":"10.1109\/CDAN.2016.7570906"},{"key":"e_1_3_2_1_12_1","article-title":"Malicious node analysis in MANETS","author":"Jamal Tauseef","year":"2018","unstructured":"Tauseef Jamal , Shariq Aziz Butt , \" Malicious node analysis in MANETS \", International Journal of Information Technology , 20 April 2018 Tauseef Jamal, Shariq Aziz Butt, \"Malicious node analysis in MANETS\", International Journal of Information Technology, 20 April 2018","journal-title":"International Journal of Information Technology"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Houda Moudni; Mohamed Er-rouidi; Hicham Mouncif; Benachir El Hadadi \"Performance analysis of AODV routing protocol in MANET under the influence of routing attacks \"International Conference on Electrical and Information Technologies (ICEIT) 4--7 May 2016  Houda Moudni; Mohamed Er-rouidi; Hicham Mouncif; Benachir El Hadadi \"Performance analysis of AODV routing protocol in MANET under the influence of routing attacks \"International Conference on Electrical and Information Technologies (ICEIT) 4--7 May 2016","DOI":"10.1109\/EITech.2016.7519658"},{"key":"e_1_3_2_1_14_1","volume-title":"Wireless Computing and Networking (GCWCN),\" IEEE Global Conference on (pp. 138--143).","author":"Performance","year":"2014","unstructured":"Desai, V., & Shekokar, .N, \" Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In Wireless Computing and Networking (GCWCN),\" IEEE Global Conference on (pp. 138--143). 2014 . Desai, V., & Shekokar, .N, \"Performance evaluation of OLSR protocol in MANET under the influence of routing attack. In Wireless Computing and Networking (GCWCN),\" IEEE Global Conference on (pp. 138--143). 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.9734\/BJMCS\/2015\/15393"},{"key":"e_1_3_2_1_16_1","unstructured":"Ruchita M Seema L. Review paper on flooding attack in MANET Int. Journal of Engineering Research and Applications. 2014;4(1).  Ruchita M Seema L. Review paper on flooding attack in MANET Int. Journal of Engineering Research and Applications. 2014;4(1)."},{"key":"e_1_3_2_1_17_1","article-title":"A survey of protocols and attacks in MANET Routing","author":"Rishabh","year":"2012","unstructured":"Rishabh J, Charul D, Meenakshi , \" A survey of protocols and attacks in MANET Routing ,\" International Journal of Computer Science and Management Studies. 2012 ;12(3). Rishabh J, Charul D, Meenakshi, \"A survey of protocols and attacks in MANET Routing,\" International Journal of Computer Science and Management Studies. 2012;12(3).","journal-title":"International Journal of Computer Science and Management Studies."},{"key":"e_1_3_2_1_18_1","article-title":"A survey of attacks in MANET","author":"Singh Manjeet","year":"2013","unstructured":"Manjeet Singh , Gaganpreet Kaur . , \" A survey of attacks in MANET ,\" International Journal of Advanced Research in Computer Science and Software Engineering. 2013 ;3(6). Manjeet Singh, Gaganpreet Kaur., \"A survey of attacks in MANET,\" International Journal of Advanced Research in Computer Science and Software Engineering. 2013;3(6).","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5120\/7640-0724"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2018.094646"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Computational Intelligence and Data Science (ICCIDS","author":"Makani Ruchi","year":"2018","unstructured":"Ruchi Makani , B.V.R. Reddy , \" Taxonomy of Machine Leaning Based Anomaly Detection and its suitability \", International Conference on Computational Intelligence and Data Science (ICCIDS 2018 ). Ruchi Makani, B.V.R. Reddy, \"Taxonomy of Machine Leaning Based Anomaly Detection and its suitability\", International Conference on Computational Intelligence and Data Science (ICCIDS 2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"e_1_3_2_1_24_1","volume-title":"Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining","author":"Mitra S., D.","year":"2014","unstructured":"Sumit, S., D. Mitra , and D. Gupta , \" Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining ,\" 2014 . IEEE. Sumit, S., D. Mitra, and D. Gupta, \"Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining,\" 2014. IEEE."},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Computational Intelligence and Communication Networks (CICN)12--14","author":"Manish Mohit","year":"2015","unstructured":"Mohit Soni; Manish Ahirwa; Shikha Agrawal , \" A Survey on Intrusion Detection Techniques in MANET,\" International Conference on Computational Intelligence and Communication Networks (CICN)12--14 Dec. 2015 Mohit Soni; Manish Ahirwa; Shikha Agrawal, \"A Survey on Intrusion Detection Techniques in MANET,\" International Conference on Computational Intelligence and Communication Networks (CICN)12--14 Dec. 2015"},{"key":"e_1_3_2_1_26_1","article-title":"Classification of intrusion detection dataset using machine learning approaches","author":"Neethu","year":"2012","unstructured":"Neethu B. \" Classification of intrusion detection dataset using machine learning approaches ,\" International Journal of Electronics and Computer Science Engineering; 2012 . Neethu B. \"Classification of intrusion detection dataset using machine learning approaches,\" International Journal of Electronics and Computer Science Engineering; 2012.","journal-title":"International Journal of Electronics and Computer Science Engineering;"},{"issue":"3","key":"e_1_3_2_1_27_1","first-page":"9","article-title":"Avishek Khan Hridoy and Dewan Md. Farid, \"Application Of Machine Learning Approaches in Intrusion Detection System: A Survey","volume":"4","author":"Haq Nutan Farah","year":"2015","unstructured":"Nutan Farah Haq , Musharrat Rafni , Abdur Rahman Onik , Faisal Muhammad Shah , Md . Avishek Khan Hridoy and Dewan Md. Farid, \"Application Of Machine Learning Approaches in Intrusion Detection System: A Survey ,\" (IJARAI) Inter- national Journal of Advanced Research in Arti_cial Intelligence , Vol. 4 , No. 3 , pp. 9 -- 18 , 2015 Nutan Farah Haq, Musharrat Rafni, Abdur Rahman Onik, Faisal Muhammad Shah, Md. Avishek Khan Hridoy and Dewan Md. Farid, \"Application Of Machine Learning Approaches in Intrusion Detection System: A Survey,\" (IJARAI) Inter- national Journal of Advanced Research in Arti_cial Intelligence, Vol. 4, No.3, pp. 9--18, 2015","journal-title":"(IJARAI) Inter- national Journal of Advanced Research in Arti_cial Intelligence"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.01.012"},{"issue":"2","key":"e_1_3_2_1_29_1","first-page":"2321","article-title":"A Novel Technique for Intrusion Detection System for Network Security Using Hybrid SVM-CART","volume":"5","author":"Puri Aastha","year":"2017","unstructured":"Aastha Puri and Nidhi Sharma , \" A Novel Technique for Intrusion Detection System for Network Security Using Hybrid SVM-CART ,\" International Journal of Engineering Development and Research , Volume 5 , Issue 2 , ISSN: 2321 -- 9939 , pp. 155--161. 2017 Aastha Puri and Nidhi Sharma, \"A Novel Technique for Intrusion Detection System for Network Security Using Hybrid SVM-CART,\" International Journal of Engineering Development and Research, Volume 5, Issue 2, ISSN: 2321-- 9939, pp. 155--161. 2017","journal-title":"International Journal of Engineering Development and Research"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.014"},{"key":"e_1_3_2_1_31_1","first-page":"1468","article-title":"Network Intrusion Detection Mechanisms Using Outlier Detection","author":"Nagamani Ch.","year":"2018","unstructured":"Ch. Nagamani and Suneetha Chittineni , \" Network Intrusion Detection Mechanisms Using Outlier Detection ,\" Second International Conference on Inventive Communication and Computational Technologies (ICICCT) , pp. 1468 -- 1473 , 2018 . Ch. Nagamani and Suneetha Chittineni, \"Network Intrusion Detection Mechanisms Using Outlier Detection,\" Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1468--1473, 2018.","journal-title":"Second International Conference on Inventive Communication and Computational Technologies (ICICCT)"},{"key":"e_1_3_2_1_32_1","first-page":"10","article-title":"Intrusion Detection System Based On Flows Using Machine Learning Algorithms","volume":"15","author":"Kakihata Eduardo Massato","year":"1988","unstructured":"Eduardo Massato Kakihata , Helton Molina Sapia , Ronaldo Toshiaki Oiakawa , Danillo Roberto Pereira , Joao Paulo Papa , Victor Hugo Costa de Albuquerque and Francisco Assis da Silva , \" Intrusion Detection System Based On Flows Using Machine Learning Algorithms ,\" IEEE Latin America Transactions , Volume 15 , Issue: 10 , pp. 1988 -- 1993, Oct. 2017. Eduardo Massato Kakihata, Helton Molina Sapia, Ronaldo Toshiaki Oiakawa, Danillo Roberto Pereira, Joao Paulo Papa, Victor Hugo Costa de Albuquerque and Francisco Assis da Silva, \"Intrusion Detection System Based On Flows Using Machine Learning Algorithms,\" IEEE Latin America Transactions, Volume 15, Issue: 10, pp. 1988 -- 1993, Oct. 2017.","journal-title":"IEEE Latin America Transactions"}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","location":"Casablanca Morocco","acronym":"SCA2019"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:27Z","timestamp":1750202607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":32,"alternative-id":["10.1145\/3368756.3369021","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369021","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}