{"_id":"FQ9wor5f8jgm6dGn2","bibbaseid":"shabut-dahal-kaiser-hossain-maliciousinsiderthreatsintacticalmanettheperformanceanalysisofdsrroutingprotocol-2017","author_short":["Shabut, A. M","Dahal, K.","Kaiser, M S.","Hossain, M."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol","author":[{"propositions":[],"lastnames":["Shabut"],"firstnames":["Antesar","M"],"suffixes":[]},{"propositions":[],"lastnames":["Dahal"],"firstnames":["Keshav"],"suffixes":[]},{"propositions":[],"lastnames":["Kaiser"],"firstnames":["M","Shamim"],"suffixes":[]},{"propositions":[],"lastnames":["Hossain"],"firstnames":["MA"],"suffixes":[]}],"booktitle":"2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)","pages":"187–192","year":"2017","organization":"IEEE","bibtex":"@inproceedings{shabut2017malicious,\n title={Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol},\n author={Shabut, Antesar M and Dahal, Keshav and Kaiser, M Shamim and Hossain, MA},\n booktitle={2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)},\n pages={187--192},\n year={2017},\n organization={IEEE}\n}\n\n","author_short":["Shabut, A. M","Dahal, K.","Kaiser, M S.","Hossain, M."],"key":"shabut2017malicious","id":"shabut2017malicious","bibbaseid":"shabut-dahal-kaiser-hossain-maliciousinsiderthreatsintacticalmanettheperformanceanalysisofdsrroutingprotocol-2017","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/Y3qXMnYoMtPnGq3yy","dataSources":["3aAmSx3tgfhWcb5kG","3qYGLegypxxYXJRSz"],"keywords":[],"search_terms":["malicious","insider","threats","tactical","manet","performance","analysis","dsr","routing","protocol","shabut","dahal","kaiser","hossain"],"title":"Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol","year":2017}