A review of flying ad hoc networks: Key characteristics, applications, and wireless technologies

F Pasandideh, JPJ da Costa, R Kunst, N Islam… - Remote Sensing, 2022 - mdpi.com
Recent advances in unmanned aerial vehicles (UAVs), or drones, have made them able to
communicate and collaborate, forming flying ad hoc networks (FANETs). FANETs are …

Selfishness in mobile ad-hoc networks: A literature review on detection techniques and prevention mechanisms

DG Kampitaki, AA Economides - IEEE Access, 2023 - ieeexplore.ieee.org
Constant connectivity is one of the most challenging requirements modern communication
networks promise to satisfy. 5G and Beyond applications and the proliferation of Internet of …

Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET

R Reka, R Karthick, RS Ram, G Singh - Computers & Security, 2024 - Elsevier
Designing of intrusion detection system (IDS), and mobile ad hoc networks (MANET)
prevention technique with examined detection rate, memory consumption with minimum …

Counteracting selfish nodes using reputation based system in mobile ad hoc networks

M Fayaz, G Mehmood, A Khan, S Abbas, M Fayaz… - Electronics, 2022 - mdpi.com
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …

[PDF][PDF] An enhanced trust-based secure route protocol for malicious node detection

SN Pari, K Sudharson - Intelligent Automation & Soft …, 2023 - pdfs.semanticscholar.org
The protection of ad-hoc networks is becoming a severe concern because of the absence of
a central authority. The intensity of the harm largely depends on the attacker's intentions …

An enhanced grey wolf optimisation–deterministic convolutional neural network (GWO–DCNN) model-based IDS in MANET

SK Prashanth, H Iqbal, B Illuri - Journal of Information & Knowledge …, 2023 - World Scientific
At present, ensuring the security of MANET is a highly challenging chore due to the dynamic
topology of the network. Hence, most of the existing Frameworks for Intrusion Detection …

Ranking Based Routing Protocol for Residual Energy Estimation in Wireless Sensor Network Based IoT Network

SA Rashid, AJ Ahmed, MH Hassan… - … Technology and its …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is widely involved in environmental monitoring. IoT network has a
limited energy supply which impacts the network's lifetime. At present, limited energy is a …

AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities

H Alrubayyi, G Goteng, M Jaber - Network, 2023 - mdpi.com
With the expansion of the digital world, the number of Internet of things (IoT) devices is
evolving dramatically. IoT devices have limited computational power and a small memory …

Research on Communication Stability of Inter-Cannonball Network Based on OPNET

Z Zhuo, J Huang, W Lu, X Lu - Applied Sciences, 2023 - mdpi.com
In modern warfare, achieving strikes against military targets commonly involves utilizing
methods such as fire coverage and missile precision guidance. While effective, fire coverage …

EpiDCA: Adaptation and implementation of a danger theory algorithm for event-based epidemiological surveillance

B Boudoua, M Roche, M Teisseire, A Tran - Computers and Electronics in …, 2025 - Elsevier
Amidst the overwhelming volume of health-related data available, diverse epidemiological
surveillance strategies have been adopted to swiftly detect outbreak events. These …