{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T05:03:40Z","timestamp":1736744620783,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482697"},{"type":"electronic","value":"9783540482727"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915034_82","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T23:40:30Z","timestamp":1164843630000},"page":"585-594","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks"],"prefix":"10.1007","author":[{"given":"Cao Trong","family":"Hieu","sequence":"first","affiliation":[]},{"given":"Tran Thanh","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jae-Jo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"82_CR1","unstructured":"IEEE 802.15-15-05-0247-00-0005, Mesh PAN Alliance (MPA), IEEE 802.15.5 Working Group for Wireless Personal Area Networks"},{"key":"82_CR2","unstructured":"IEEE 802.15.5-05-0260-00-0005, IEEE 802.15.5 WPAN Mesh Network, IEEE 802.15.5 Working Group for Wireless Personal Area Networks"},{"key":"82_CR3","doi-asserted-by":"crossref","unstructured":"Guan, Y., Ghorbani, A.B.: A clustering method for intrusion detection. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, Canada, pp. 1083\u20131086 (2003)","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"82_CR4","doi-asserted-by":"crossref","unstructured":"Basagni, S.: Distributed Clustering in Ad Hoc Networks. In: Proceedings of the 1999 Intl. Symp. on Parallel Architectures, Algorithms and Networks (I-SPAN 1999), Freemantle, Australia (1999)","DOI":"10.1109\/ISPAN.1999.778957"},{"key":"82_CR5","volume-title":"Proceeding of the Third IEEE International Workshop on Information Assurance (IWIA 2005)","author":"D. Sterne","year":"2005","unstructured":"Sterne, D.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceeding of the Third IEEE International Workshop on Information Assurance (IWIA 2005), IEEE, Los Alamitos (2005)"},{"key":"82_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Y.-a., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), George W. Johnson Center at George Mason University, USA, October 31 (2003)","DOI":"10.1145\/986858.986877"},{"key":"82_CR7","unstructured":"Karpijoki, V.: Security in Ad Hoc Networks, http:\/\/citeseer.nj.nec.com\/karpijoki01security.html"},{"key":"82_CR8","unstructured":"Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Network. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)"},{"key":"82_CR9","unstructured":"Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16\/17 (2002)"},{"key":"82_CR10","doi-asserted-by":"crossref","unstructured":"Theoleyre, F., Valois, F.: A Virtual Structure for Hybrid Networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, USA (March 2004)","DOI":"10.1109\/WCNC.2004.1311331"},{"key":"82_CR11","doi-asserted-by":"crossref","unstructured":"Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K.: A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review (1997)","DOI":"10.1145\/263876.263885"},{"key":"82_CR12","doi-asserted-by":"crossref","unstructured":"Huang, M.-Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 2465\u20132475 (1999)","DOI":"10.1016\/S1389-1286(99)00114-0"},{"key":"82_CR13","volume-title":"Advances in Neural Information Processing Systems","author":"J. Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.-J., Milikkulainen, R.: Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems. Proceedings of NIPS 1997, Denver, CO, vol.\u00a010, MIT Press, Cambridge (1998)"},{"key":"82_CR14","doi-asserted-by":"crossref","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering, 181\u2013199 (1995)","DOI":"10.1109\/32.372146"},{"key":"82_CR15","unstructured":"Porras, P.A., Neumann, P.G.: Emerald, Event monitoring enabling responses to anomalous live disturbances. In: Proc. of 20th NIST-NCSC Nat\u2019l. Info. Systems Security Conf., pp. 353\u2013365 (1997)"},{"key":"82_CR16","unstructured":"Zheng, J., Lee, M.J., Anshel, M.: Towards Secure Low Rate Wireless Personal Area Networks. IEEE Transactions on mobile computing"},{"key":"82_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)","DOI":"10.1145\/345910.345958"},{"key":"82_CR18","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.: Ad Hoc On Demand Distance Vector (AODV) Routing. IETF RFC 3561"},{"key":"82_CR19","volume-title":"Ad Hoc Networking","author":"C.E. Perkins","year":"2000","unstructured":"Perkins, C.E., Royer, E.M.: The ad hoc on-demand distance-vector protocol. In: Perkins, C.E. (ed.) Ad Hoc Networking, Addison-Wesley, Reading (2000)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915034_82.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:52:36Z","timestamp":1736661156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915034_82"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482697","9783540482727"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11915034_82","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}