A review of flying ad hoc networks: Key characteristics, applications, and wireless technologies
Recent advances in unmanned aerial vehicles (UAVs), or drones, have made them able to
communicate and collaborate, forming flying ad hoc networks (FANETs). FANETs are …
communicate and collaborate, forming flying ad hoc networks (FANETs). FANETs are …
Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms
DG Kampitaki, AA Economides - IEEE Access, 2023 - ieeexplore.ieee.org
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET
R Reka, R Karthick, RS Ram, G Singh - Computers & Security, 2024 - Elsevier
Designing of intrusion detection system (IDS), and mobile ad hoc networks (MANET)
prevention technique with examined detection rate, memory consumption with minimum …
prevention technique with examined detection rate, memory consumption with minimum …
Counteracting selfish nodes using reputation based system in mobile ad hoc networks
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …
nodes without predefined and pre-established architecture where mobile nodes can …
[PDF][PDF] An enhanced trust-based secure route protocol for malicious node detection
SN Pari, K Sudharson - Intelligent Automation & Soft …, 2023 - pdfs.semanticscholar.org
The protection of ad-hoc networks is becoming a severe concern because of the absence of
a central authority. The intensity of the harm largely depends on the attacker's intentions …
a central authority. The intensity of the harm largely depends on the attacker's intentions …
An enhanced grey wolf optimisation–deterministic convolutional neural network (GWO–DCNN) model-based IDS in MANET
SK Prashanth, H Iqbal, B Illuri - Journal of Information & Knowledge …, 2023 - World Scientific
At present, ensuring the security of MANET is a highly challenging chore due to the dynamic
topology of the network. Hence, most of the existing Frameworks for Intrusion Detection …
topology of the network. Hence, most of the existing Frameworks for Intrusion Detection …
Ranking Based Routing Protocol for Residual Energy Estimation in Wireless Sensor Network Based IoT Network
Internet of Things (IoT) is widely involved in environmental monitoring. IoT network has a
limited energy supply which impacts the network's lifetime. At present, limited energy is a …
limited energy supply which impacts the network's lifetime. At present, limited energy is a …
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities
With the expansion of the digital world, the number of Internet of things (IoT) devices is
evolving dramatically. IoT devices have limited computational power and a small memory …
evolving dramatically. IoT devices have limited computational power and a small memory …
Research on Communication Stability of Inter-Cannonball Network Based on OPNET
Z Zhuo, J Huang, W Lu, X Lu - Applied Sciences, 2023 - mdpi.com
In modern warfare, achieving strikes against military targets commonly involves utilizing
methods such as fire coverage and missile precision guidance. While effective, fire coverage …
methods such as fire coverage and missile precision guidance. While effective, fire coverage …
EpiDCA: Adaptation and implementation of a danger theory algorithm for event-based epidemiological surveillance
Amidst the overwhelming volume of health-related data available, diverse epidemiological
surveillance strategies have been adopted to swiftly detect outbreak events. These …
surveillance strategies have been adopted to swiftly detect outbreak events. These …