{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:00:22Z","timestamp":1773655222778,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.3103\/s0146411618080084","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T10:50:13Z","timestamp":1551955813000},"page":"971-976","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model"],"prefix":"10.3103","volume":"52","author":[{"given":"R. A.","family":"Demidov","sequence":"first","affiliation":[]},{"given":"P. D.","family":"Zegzhda","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"7068_CR1","doi-asserted-by":"publisher","first-page":"907","DOI":"10.3103\/S0146411617080120","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907\u2013914.","journal-title":"Autom. Control Comput. Sci."},{"key":"7068_CR2","unstructured":"Komala, S.R., Srinivas Shetty, Padmashree, S., and Elevarasi, E., Wireless Ad Hoc Mobile Networks, National Conference on Computing Communication and Technology, 2010, pp. 168\u2013174."},{"key":"7068_CR3","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Yih-Chun Hu, and Jetcheva, J., A Performance Comparison of Multi-hop Wireless Ad Hoc Network Routing Protocols. http:\/\/www.monarch.cs.cmu.edu\/."},{"key":"7068_CR4","doi-asserted-by":"crossref","unstructured":"Perkins, C. and Royer, E., Ad hoc on-demand distance vector routing, Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, 1999, pp. 90\u2013100.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"7068_CR5","doi-asserted-by":"crossref","unstructured":"Sumra, I., Ahmad, I., Hasbullah, H., and Manan, J., Classes of attacks in VANET, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC), 2011, pp. 1\u20135.","DOI":"10.1109\/SIECPC.2011.5876939"},{"key":"7068_CR6","doi-asserted-by":"crossref","unstructured":"Yifeng Zhou, Lamont, L., and Li Li, Wormhole attack detection based on distance verification and the use of hypothesis testing for wireless ad hoc networks, MILCOM 2009\u20142009 IEEE Military Communications Conference, Boston, 2009, pp. 1\u20137.","DOI":"10.1109\/MILCOM.2009.5379870"},{"key":"7068_CR7","doi-asserted-by":"crossref","unstructured":"Tamilselvan, L. and Sankaranarayanan, V., Prevention of blackhole attack in MANET, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, 2007, p. 21.","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"key":"7068_CR8","volume-title":"Computational Limitations of Small-Depth Circuits","author":"J. Hastad","year":"1987","unstructured":"Hastad, J., Computational Limitations of Small-Depth Circuits, Cambridge, MA: MIT Press, 1987."},{"key":"7068_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Yoshua Bengio","year":"2009","unstructured":"Yoshua Bengio, Learning deep architectures for AI, Found. Trends Mach. Learn., 2009, vol. 2, no. 1, pp. 1\u2013127. http:\/\/dx.doi.org\/.10.1561\/2200000006","journal-title":"Found. Trends Mach. Learn."},{"key":"7068_CR10","unstructured":"Montufar, G., et al., On the number of linear regions of deep neural networks, Proc. 27th NIPS, Cambridge, MA, 2014, pp. 2924\u20132932."},{"key":"7068_CR11","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., and Skiena, S., DeepWalk: Online learning of social representations, Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), New York, 2014, pp. 701\u2013710.","DOI":"10.1145\/2623330.2623732"},{"key":"7068_CR12","unstructured":"Mikolov, T., Sutskever, I., Kai Chen, Corrado, G., and Dean, J., Distributed representations of words and phrases and their compositionality, Proceedings of the 26th International Conference on Neural Information Processing Systems (NIPS\u201913), Burges, C.J.C., Bottou, L., Welling, M., Ghahramani, Z., and Weinberger, K.Q., Eds., 2013, vol. 2, pp. 3111\u20133119."},{"key":"7068_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/72.977323","volume":"13","author":"Xinghuo Yu","year":"2002","unstructured":"Xinghuo Yu, Efe, M.O., and Kaynak, O., A general backpropagation algorithm for feedforward neural networks learning, IEEE Trans. Neural Networks, 2002, vol. 13, no. 1, pp. 251\u2013254.","journal-title":"IEEE Trans. Neural Networks"},{"key":"7068_CR14","unstructured":"Kipf, T.N. and Welling, M., Semi-supervised classification with graph convolutional networks, CoRR abs\/1609.02907, 2016."},{"key":"7068_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S. Hochreiter","year":"1997","unstructured":"Hochreiter, S. and Schmidhuber, J., Long short-term memory, Neural Comput., 1997, vol. 9, no. 8, pp. 1735\u20131780.","journal-title":"Neural Comput."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080084.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411618080084","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080084.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:49Z","timestamp":1773611929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411618080084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["7068"],"URL":"https:\/\/doi.org\/10.3103\/s0146411618080084","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"12 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}