{"id":"https://openalex.org/W2096098272","doi":"https://doi.org/10.1109/istel.2012.6483123","title":"Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on nodes' mode","display_name":"Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on nodes' mode","publication_year":2012,"publication_date":"2012-11-01","ids":{"openalex":"https://openalex.org/W2096098272","doi":"https://doi.org/10.1109/istel.2012.6483123","mag":"2096098272"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2012.6483123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091631780","display_name":"Meisam Yadollahzadeh\u2010Tabari","orcid":"https://orcid.org/0000-0002-5231-7611"},"institutions":[{"id":"https://openalex.org/I176861719","display_name":"University of Shahrood","ror":"https://ror.org/00yqvtm78","country_code":"IR","type":"education","lineage":["https://openalex.org/I176861719"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Meisam Yadollahazadeh Tabari","raw_affiliation_strings":["Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran","institution_ids":["https://openalex.org/I176861719"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032401284","display_name":"Hamid Hassanpour","orcid":"https://orcid.org/0000-0002-5513-9822"},"institutions":[{"id":"https://openalex.org/I176861719","display_name":"University of Shahrood","ror":"https://ror.org/00yqvtm78","country_code":"IR","type":"education","lineage":["https://openalex.org/I176861719"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamid Hassanpour","raw_affiliation_strings":["Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran","institution_ids":["https://openalex.org/I176861719"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064354580","display_name":"Ali A. Pouyan","orcid":"https://orcid.org/0000-0002-8614-9185"},"institutions":[{"id":"https://openalex.org/I176861719","display_name":"University of Shahrood","ror":"https://ror.org/00yqvtm78","country_code":"IR","type":"education","lineage":["https://openalex.org/I176861719"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Pouyan","raw_affiliation_strings":["Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Eng. & IT, Shahrood University of Technology,Shahrood,Iran","institution_ids":["https://openalex.org/I176861719"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005895132","display_name":"Saman Saleki","orcid":null},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Saman Saleki","raw_affiliation_strings":["Department of Computer Engineering, South of Tehran Branch, Islamic Azad University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, South of Tehran Branch, Islamic Azad University, Tehran, Iran","institution_ids":["https://openalex.org/I110525433"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":72,"max":76},"biblio":{"volume":"34","issue":null,"first_page":"948","last_page":"953"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Ad Hoc Wireless Networks Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Ad Hoc Wireless Networks Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Delay-Tolerant Networking in Mobile Ad Hoc Networks","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.607335},{"id":"https://openalex.org/keywords/mobile-ad-hoc-networks","display_name":"Mobile Ad Hoc Networks","score":0.602808},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.54661},{"id":"https://openalex.org/keywords/ad-hoc-networks","display_name":"Ad Hoc Networks","score":0.543337},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly Detection","score":0.535283},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.5265254}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010459},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.67658526},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6281626},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6064809},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5741663},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5704204},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.56177765},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5377256},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.5265254},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.43435258},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43046764},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.16068628},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15305823},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1034185},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08901289},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.069906205},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2012.6483123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W1525180324","https://openalex.org/W1598276955","https://openalex.org/W185358023","https://openalex.org/W1965861742","https://openalex.org/W1971026061","https://openalex.org/W1977943948","https://openalex.org/W2011094081","https://openalex.org/W2012676931","https://openalex.org/W2019207321","https://openalex.org/W204979787","https://openalex.org/W2055365619","https://openalex.org/W2067514565","https://openalex.org/W2067743527","https://openalex.org/W2070492530","https://openalex.org/W2072463110","https://openalex.org/W2085196567","https://openalex.org/W2087409486","https://openalex.org/W2090636507","https://openalex.org/W2112203433","https://openalex.org/W2125997818","https://openalex.org/W2126756515","https://openalex.org/W2135057483","https://openalex.org/W2150411054","https://openalex.org/W2168385105","https://openalex.org/W2383218167","https://openalex.org/W26711432","https://openalex.org/W3112127769","https://openalex.org/W3146863510"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W2551975114","https://openalex.org/W2364523259","https://openalex.org/W2123281165","https://openalex.org/W2025838880","https://openalex.org/W2003275014","https://openalex.org/W1975978427","https://openalex.org/W1591014886","https://openalex.org/W1511473871"],"abstract_inverted_index":{"In":[0],"this":[1,25,71],"paper":[2],"we":[3],"propose":[4],"a":[5,44,115,120],"light":[6],"weight":[7],"semi-distributed":[8],"IDS":[9],"architecture":[10,59,79,87,113],"for":[11,22],"intrusion":[12],"detection":[13,36,80],"in":[14,24,51,70,99,119],"mobile":[15],"ad-hoc":[16],"network.":[17],"We":[18,73],"consider":[19],"three":[20],"modes":[21],"nodes":[23],"network":[26,121],"as":[27,77],"normal,":[28],"attack-presented,":[29],"and":[30,57,63,96,98,126],"suspicious":[31],"which":[32,48],"the":[33,68,85],"process":[34],"of":[35,84],"is":[37,43,103],"based":[38],"on":[39],"them.":[40],"Suspicious":[41],"mode":[42],"rough":[45],"detecting":[46],"situation":[47],"may":[49],"occur":[50],"both":[52],"normal":[53],"or":[54],"attack-presented":[55],"mode,":[56],"our":[58,78,112],"changes":[60],"to":[61,66],"distributed":[62],"cooperative":[64],"fashion":[65],"overcome":[67],"ambiguity":[69],"mode.":[72],"use":[74],"neural-fuzzy":[75],"interface":[76],"engine.":[81],"The":[82],"ability":[83,117],"proposed":[86],"has":[88,114],"been":[89],"evaluated":[90],"using":[91],"two":[92],"introduced":[93],"measures":[94],"(PTDN":[95],"PFDN),":[97],"overhead":[100],"case":[101],"it":[102],"compared":[104],"with":[105,122,130],"traditional":[106],"standalone":[107],"architecture.":[108],"Results":[109],"show":[110],"that":[111],"good":[116],"even":[118],"low":[123,131],"level":[124],"attack":[125],"rapid":[127],"node":[128],"movement":[129],"overhead.":[132]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2096098272","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2024-10-24T12:54:24.914575","created_date":"2016-06-24"}