{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:11:40Z","timestamp":1729620700607,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/wocn.2013.6616243","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T19:29:59Z","timestamp":1381433399000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks"],"prefix":"10.1109","author":[{"given":"Neha","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Rajeev Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Shrivastava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2011.6165202"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2007.14"},{"key":"17","first-page":"76","article-title":"Policy-based malicious peer detectionin ad hoc networks","volume":"3","author":"li","year":"2009","journal-title":"IEEE International Conference on Computational Science and Engineering CSE'09"},{"key":"18","first-page":"225","article-title":"Enhancing the performance of MANET using EESCP","author":"siva kumar","year":"2012","journal-title":"IEEE Proceedings of the International Conference on Pattern Recognition Informatics and Medical Engineering"},{"key":"15","first-page":"696","article-title":"Security through collaboration in MANETs","volume":"10","author":"li","year":"2008","journal-title":"4th International Conference on Collaborative Computing Networking Applications and Worksharing (CollaborateCom 2008) Ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering (LNICST)"},{"key":"16","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MDM.2009.22","article-title":"Outlier detection in ad hoc networks usingdempster-shafer theory","author":"li","year":"2009","journal-title":"IEEE Tenth InternationalConference on Mobile Data Management Systems Services and Middleware MDM '09"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/B:WIRE.0000047071.75971.cd"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180357"},{"key":"11","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti sergio","year":"2000","journal-title":"Proceedings of the Annual International Conference on Mobile Computing and Networking MOBICOM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/939010.939011"},{"key":"21","first-page":"1565","article-title":"Improved weight clustering algorithm for IDs in mobile AdHoc network","author":"zhou","year":"2007","journal-title":"IEEE Wireless Communications Networking and Mobile Computing WiCom '07 International Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPWC.2005.1431309"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"6","first-page":"1","article-title":"A data intensive reputation management scheme for vehicular ad hoc networks","author":"joshi","year":"2006","journal-title":"IEEE3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops Mobiquitous '06"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986876"},{"key":"8","doi-asserted-by":"crossref","first-page":"2147","DOI":"10.1109\/VETECF.2003.1285404","article-title":"SVM-based intrusion detectionsystem for wireless ad hoc networks","volume":"3","author":"deng","year":"2003","journal-title":"IEEE58th Vehicular Technology Conference VTC 2003-Fall"}],"event":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks - (WOCN)","start":{"date-parts":[[2013,7,26]]},"location":"Bhopal, India","end":{"date-parts":[[2013,7,28]]}},"container-title":["2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589213\/6616171\/06616243.pdf?arnumber=6616243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T12:12:57Z","timestamp":1564488777000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6616243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wocn.2013.6616243","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}