{"id":"https://openalex.org/W2805862109","doi":"https://doi.org/10.1145/3195612.3195617","title":"A behavioural theory for intrusion detection system in mobile ad-hoc networks","display_name":"A behavioural theory for intrusion detection system in mobile ad-hoc networks","publication_year":2018,"publication_date":"2018-03-15","ids":{"openalex":"https://openalex.org/W2805862109","doi":"https://doi.org/10.1145/3195612.3195617","mag":"2805862109"},"language":"en","primary_location":{"id":"doi:10.1145/3195612.3195617","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3195612.3195617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071723171","display_name":"Parul Yadav","orcid":"https://orcid.org/0000-0001-6004-7589"},"institutions":[{"id":"https://openalex.org/I91699865","display_name":"Indian Institute of Management Lucknow","ror":"https://ror.org/05gfjrx96","country_code":"IN","type":"education","lineage":["https://openalex.org/I91699865"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Parul Yadav","raw_affiliation_strings":["Institute of Engineering &amp; Technology, Lucknow, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Institute of Engineering &amp; Technology, Lucknow, Uttar Pradesh, India","institution_ids":["https://openalex.org/I91699865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045024771","display_name":"Manish Gaur","orcid":"https://orcid.org/0000-0002-4161-2789"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manish Gaur","raw_affiliation_strings":["Centre for Advanced Studies Lucknow, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Studies Lucknow, Uttar Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071723171"],"corresponding_institution_ids":["https://openalex.org/I91699865"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63064894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7227783203125},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6474809050559998},{"id":"https://openalex.org/keywords/process-calculus","display_name":"Process calculus","score":0.6095418334007263},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5838940143585205},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5793850421905518},{"id":"https://openalex.org/keywords/unicast","display_name":"Unicast","score":0.5517470836639404},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5220860838890076},{"id":"https://openalex.org/keywords/geocast","display_name":"Geocast","score":0.521706759929657},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5096559524536133},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.5092703104019165},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5072447657585144},{"id":"https://openalex.org/keywords/bisimulation","display_name":"Bisimulation","score":0.48345980048179626},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45412153005599976},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4356839060783386},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.41626033186912537},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.3957693874835968},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.27234819531440735},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.2113940715789795},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20497414469718933},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1870637834072113},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.17619559168815613},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.13963967561721802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12618675827980042},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09383153915405273},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08325222134590149}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7227783203125},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6474809050559998},{"id":"https://openalex.org/C161771561","wikidata":"https://www.wikidata.org/wiki/Q1970286","display_name":"Process calculus","level":2,"score":0.6095418334007263},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5838940143585205},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5793850421905518},{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.5517470836639404},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5220860838890076},{"id":"https://openalex.org/C108207678","wikidata":"https://www.wikidata.org/wiki/Q689216","display_name":"Geocast","level":5,"score":0.521706759929657},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5096559524536133},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.5092703104019165},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5072447657585144},{"id":"https://openalex.org/C135315306","wikidata":"https://www.wikidata.org/wiki/Q866364","display_name":"Bisimulation","level":2,"score":0.48345980048179626},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45412153005599976},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4356839060783386},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.41626033186912537},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.3957693874835968},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.27234819531440735},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.2113940715789795},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20497414469718933},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1870637834072113},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.17619559168815613},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.13963967561721802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12618675827980042},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09383153915405273},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08325222134590149},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3195612.3195617","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3195612.3195617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W19874990","https://openalex.org/W32641163","https://openalex.org/W337564687","https://openalex.org/W1791247685","https://openalex.org/W1973054120","https://openalex.org/W2042207153","https://openalex.org/W2042562411","https://openalex.org/W2048755856","https://openalex.org/W2073385346","https://openalex.org/W2103862346","https://openalex.org/W2113928343","https://openalex.org/W2115373791","https://openalex.org/W2116371509","https://openalex.org/W2135892629","https://openalex.org/W2135988418","https://openalex.org/W2147882403","https://openalex.org/W2158210197","https://openalex.org/W2160203360","https://openalex.org/W2164432730","https://openalex.org/W2282481418","https://openalex.org/W2581022583","https://openalex.org/W2898649110","https://openalex.org/W3152170660"],"related_works":["https://openalex.org/W1966768284","https://openalex.org/W2141226803","https://openalex.org/W1972955796","https://openalex.org/W2978800595","https://openalex.org/W2219910205","https://openalex.org/W1541857863","https://openalex.org/W207048982","https://openalex.org/W2026651734","https://openalex.org/W2385427787","https://openalex.org/W2028287290"],"abstract_inverted_index":{"We":[0,78,109,124],"propose":[1],"a":[2,126,135],"Calculi":[3,61],"in":[4,18,56,76],"process":[5],"algebraic":[6],"framework":[7],"to":[8,116],"formally":[9],"model":[10],"Intrusion":[11],"Detection":[12],"System":[13],"(IDS)":[14],"for":[15,67,72,147],"secure":[16],"routing":[17],"Mobile":[19,57],"Ad-hoc":[20,58],"Networks.":[21,59],"The":[22,37,60],"proposed":[23,122],"calculi,":[24],"named":[25],"as":[26,87,93],"dRi,":[27],"is":[28],"basically":[29],"an":[30,111],"extension":[31],"of":[32,53,83,120],"Distributed":[33],"pi":[34],"calculus":[35],"(Dpi).":[36],"calculi":[38],"models":[39],"unicast,":[40],"multicast":[41],"&":[42,142],"broadcast":[43],"communication,":[44],"node":[45,50],"mobility,":[46],"energy":[47],"conservation":[48],"at":[49],"and":[51,70,159],"detection":[52],"malicious":[54],"node(s)":[55],"has":[62],"two":[63,81],"syntactic":[64],"categories:":[65],"one":[66,86],"describing":[68],"nodes":[69],"another":[71,92],"processes":[73],"which":[74],"reside":[75],"nodes.":[77],"also":[79,143],"present":[80,110,144],"views":[82],"semantic":[84],"reductions;":[85],"reduction":[88,101,140],"on":[89,102,106,138],"configurations":[90,103],"whereas":[91],"LTSs":[94,115],"(Labelled":[95],"Transition":[96],"Systems),":[97],"behavioural":[98],"semantics,":[99],"where":[100],"are":[104],"described":[105,113],"various":[107],"actions.":[108],"example":[112],"using":[114],"show":[117],"the":[118,121],"capability":[119],"calculi.":[123],"define":[125,134],"bisimulation":[127,148],"based":[128,149],"equivalence":[129,137,150,158],"between":[130],"configurations.":[131],"Further":[132],"we":[133],"touch-stone":[136,157],"its":[139,156],"semantics":[141],"prove":[145],"outline":[146],"that":[151],"can":[152],"be":[153],"recovered":[154],"from":[155],"vice-versa.":[160]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
