{"id":"https://openalex.org/W2996008843","doi":"https://doi.org/10.1109/tencon.2019.8929362","title":"Decision Tree based AIS strategy for Intrusion Detection in MANET","display_name":"Decision Tree based AIS strategy for Intrusion Detection in MANET","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2996008843","doi":"https://doi.org/10.1109/tencon.2019.8929362","mag":"2996008843"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2019.8929362","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929362","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002639895","display_name":"Lincy Elizebeth Jim","orcid":null},"institutions":[{"id":"https://openalex.org/I2802584246","display_name":"Melbourne School of Theology","ror":"https://ror.org/05kdkdw55","country_code":"AU","type":"education","lineage":["https://openalex.org/I2802584246"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Lincy Elizebeth Jim","raw_affiliation_strings":["Melbourne Institute of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Melbourne Institute of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I2802584246"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061562428","display_name":"Jim Chacko","orcid":null},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jim Chacko","raw_affiliation_strings":["La Trobe Financial Services, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"La Trobe Financial Services, Melbourne, Australia","institution_ids":["https://openalex.org/I196829312"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002639895"],"corresponding_institution_ids":["https://openalex.org/I2802584246"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74569126,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"1191","last_page":"1195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7488521337509155},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7239110469818115},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7125305533409119},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6912683844566345},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.456729918718338},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39285194873809814},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36413100361824036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35558784008026123},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09050983190536499}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7488521337509155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239110469818115},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7125305533409119},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6912683844566345},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.456729918718338},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39285194873809814},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36413100361824036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35558784008026123},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09050983190536499},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2019.8929362","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929362","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1532102099","https://openalex.org/W1767780060","https://openalex.org/W2000548713","https://openalex.org/W2023688261","https://openalex.org/W2074888132","https://openalex.org/W2081391147","https://openalex.org/W2102258543","https://openalex.org/W2104375160","https://openalex.org/W2104514878","https://openalex.org/W2120276091","https://openalex.org/W2127699957","https://openalex.org/W2144508499","https://openalex.org/W2145049340","https://openalex.org/W2145736817","https://openalex.org/W2148044949","https://openalex.org/W2158190537","https://openalex.org/W2160760138","https://openalex.org/W2324452940","https://openalex.org/W2624262714","https://openalex.org/W3098989474","https://openalex.org/W3121147667","https://openalex.org/W3122820300","https://openalex.org/W6637738437","https://openalex.org/W6650655300","https://openalex.org/W6677944244","https://openalex.org/W6679416362","https://openalex.org/W6701212675"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W2364523259","https://openalex.org/W1975978427","https://openalex.org/W2061944504","https://openalex.org/W2786222771","https://openalex.org/W2122022187","https://openalex.org/W2115529843"],"abstract_inverted_index":{"Mobile":[0],"Ad":[1],"hoc":[2],"Networks":[3],"(MANETs)":[4],"are":[5,9,19,81],"wireless":[6,84],"networks":[7,80,85],"that":[8],"void":[10],"of":[11,24,32,52,62,94,99,116,142,156,202],"fixed":[12],"infrastructure":[13],"as":[14,146],"the":[15,22,28,50,55,59,139,154,157,161,175,200],"communication":[16,107],"between":[17],"nodes":[18,53,96,126,137,197],"dependent":[20],"on":[21],"liaison":[23],"each":[25],"node":[26],"in":[27,34,54,78,102,114],"network.":[29,56],"The":[30,122,135],"efficacy":[31],"MANET":[33,103],"critical":[35],"scenarios":[36],"like":[37,118],"battlefield":[38],"communications,":[39],"natural":[40],"disaster":[41],"require":[42],"new":[43,64],"security":[44,65],"strategies":[45],"and":[46,97,111,120,151,166],"policies":[47],"to":[48,58,68,71,87,91,108,128,163,169,173,193],"guarantee":[49],"integrity":[51],"Due":[57],"inherent":[60],"frailty":[61],"MANETs,":[63],"measures":[66],"need":[67],"be":[69],"developed":[70],"defend":[72],"them.":[73],"Intrusion":[74],"Detection":[75],"strategy":[76,190],"used":[77],"wired":[79],"unbefitting":[82],"for":[83],"due":[86],"reasons":[88],"not":[89],"limited":[90],"resource":[92],"constraints":[93],"participating":[95],"nature":[98],"communication.":[100],"Nodes":[101],"utilize":[104],"multi":[105],"hop":[106],"forward":[109],"packets":[110,168],"this":[112,180],"result":[113],"consumption":[115],"resources":[117],"battery":[119],"memory.":[121],"intruder":[123],"or":[124,130],"cheat":[125,136,196],"decide":[127],"cooperate":[129],"non-cooperate":[131],"with":[132],"other":[133],"nodes.":[134],"reduce":[138],"overall":[140],"effectiveness":[141],"network":[143,158],"communications":[144],"such":[145,195],"reduced":[147],"packet":[148,162,203],"delivery":[149],"ratio":[150],"sometimes":[152],"increase":[153],"congestion":[155],"by":[159],"forwarding":[160],"wrong":[164],"destination":[165],"causing":[167],"take":[170],"more":[171],"times":[172],"reach":[174],"appropriate":[176],"final":[177],"destination.":[178],"In":[179],"paper":[181],"a":[182],"decision":[183],"tree":[184],"based":[185],"artificial":[186],"immune":[187],"system":[188],"(AIS)":[189],"is":[191],"utilized":[192],"detect":[194],"thereby":[198],"improving":[199],"efficiency":[201],"delivery.":[204]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
