{"_id":"EKe8CYGhE3yrmPnE9","bibbaseid":"shabut-dahal-kaiser-hossain-maliciousinsiderthreatsintacticalmanettheperformaceanalysisofdsrroutingprotocol-2017","author_short":["Shabut, A. M.","Dahal, K. P.","Kaiser, M. S.","Hossain, M. A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Antesar","M."],"propositions":[],"lastnames":["Shabut"],"suffixes":[]},{"firstnames":["Keshav","P."],"propositions":[],"lastnames":["Dahal"],"suffixes":[]},{"firstnames":["M.","Shamim"],"propositions":[],"lastnames":["Kaiser"],"suffixes":[]},{"firstnames":["M.","Alamgir"],"propositions":[],"lastnames":["Hossain"],"suffixes":[]}],"editor":[{"firstnames":["Yulei"],"propositions":[],"lastnames":["Wu"],"suffixes":[]},{"firstnames":["Geyong"],"propositions":[],"lastnames":["Min"],"suffixes":[]},{"firstnames":["Nektarios"],"propositions":[],"lastnames":["Georgalas"],"suffixes":[]},{"firstnames":["Ahmed"],"propositions":[],"lastnames":["Al-Dubi"],"suffixes":[]},{"firstnames":["Xiaolong"],"propositions":[],"lastnames":["Jin"],"suffixes":[]},{"firstnames":["Laurence","T."],"propositions":[],"lastnames":["Yang"],"suffixes":[]},{"firstnames":["Jianhua"],"propositions":[],"lastnames":["Ma"],"suffixes":[]},{"firstnames":["Po"],"propositions":[],"lastnames":["Yang"],"suffixes":[]}],"title":"Malicious Insider Threats in Tactical MANET: The Performace Analysis of DSR Routing Protocol","booktitle":"2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, United Kingdom, June 21-23, 2017","pages":"390–395","publisher":"IEEE Computer Society","year":"2017","url":"https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.64","doi":"10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.64","timestamp":"Tue, 25 Feb 2025 09:21:51 +0100","biburl":"https://dblp.org/rec/conf/ithings/ShabutDKH17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ithings/ShabutDKH17,\n author = {Antesar M. Shabut and\n Keshav P. Dahal and\n M. Shamim Kaiser and\n M. Alamgir Hossain},\n editor = {Yulei Wu and\n Geyong Min and\n Nektarios Georgalas and\n Ahmed Al{-}Dubi and\n Xiaolong Jin and\n Laurence T. Yang and\n Jianhua Ma and\n Po Yang},\n title = {Malicious Insider Threats in Tactical {MANET:} The Performace Analysis\n of {DSR} Routing Protocol},\n booktitle = {2017 {IEEE} International Conference on Internet of Things (iThings)\n and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}\n Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data\n (SmartData), Exeter, United Kingdom, June 21-23, 2017},\n pages = {390--395},\n publisher = {{IEEE} Computer Society},\n year = {2017},\n url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.64},\n doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.64},\n timestamp = {Tue, 25 Feb 2025 09:21:51 +0100},\n biburl = {https://dblp.org/rec/conf/ithings/ShabutDKH17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Shabut, A. M.","Dahal, K. P.","Kaiser, M. S.","Hossain, M. A."],"editor_short":["Wu, Y.","Min, G.","Georgalas, N.","Al-Dubi, A.","Jin, X.","Yang, L. T.","Ma, J.","Yang, P."],"key":"DBLP:conf/ithings/ShabutDKH17","id":"DBLP:conf/ithings/ShabutDKH17","bibbaseid":"shabut-dahal-kaiser-hossain-maliciousinsiderthreatsintacticalmanettheperformaceanalysisofdsrroutingprotocol-2017","role":"author","urls":{"Paper":"https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.64"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/80/10014.bib","dataSources":["7w9HtinE43mdCrTS8","3aAmSx3tgfhWcb5kG","3qYGLegypxxYXJRSz"],"keywords":[],"search_terms":["malicious","insider","threats","tactical","manet","performace","analysis","dsr","routing","protocol","shabut","dahal","kaiser","hossain"],"title":"Malicious Insider Threats in Tactical MANET: The Performace Analysis of DSR Routing Protocol","year":2017}