Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks

J Kusyk, MU Uyar, CS Sahin - Evolutionary Intelligence, 2018 - Springer
In this paper, a comprehensive survey of evolutionary computation (EC) methods for
cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …

[PDF][PDF] Research Article Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security

P Selvarani, P Visu - Research Journal of Applied Sciences …, 2015 - researchgate.net
To achieve data storage security in cloud, bio cryptography techniques can be used. This
study presents Personal identification using fingerprint and Iris biometric technology. Usually …

Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET

A Rattrout, A Yasin, M Abu-Zant, M Yasin… - Proceedings of the 2nd …, 2018 - dl.acm.org
One of the most important challenges that MANET face is how to connect nodes together
also how to adapt the dynamically changes in the network topology. A novel clustering …

Modified artificial bee colony (abc) algorithm using dynamic technique

MS Beg, AA Waoo - Asian Journal of Electrical Sciences, 2021 - ajesjournal.org
Abstract The artificial Bee Colony Algorithm is a maximum optimization technique. It has
been used in various research papers. In this paper, the dynamic technique has been used …

[PDF][PDF] Efficient Neighbor Routing in Wireless Mesh Networks

VL Praba, AM Rani - … Journal of Computer Science and Business …, 2013 - researchgate.net
ABSTRACT Wireless Mesh Network (WMN) is a rising technology in the wireless field and
has the advanced features like self-healing, self-configuring, low deployment cost, easy …

My way—Routing in multi hop heterogenous wireless sensor networks using straight line algorithm. V2

PK Rani, E Kannan - 2014 International Conference on Science …, 2014 - ieeexplore.ieee.org
Straightline routing v2 algorithm is one of the optimized proposed model to route the data
packets efficiently in multi hop heterogeneous Wireless sensor networks. Due to the …

[PDF][PDF] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage

GS Priyatharsini, P Visu - Research Journal of Applied Sciences …, 2015 - researchgate.net
Cloud computing is a significant shift of computational paradigm where computing as a utility
and storing data remotely have a great potential. Cloud server provides a low cost, flexible …

[引用][C] Combined swarm intelligence routing protocol for MANET

P Visu, E Kannan - Information Technology …, 2013 - Asian Network for Scientific …

[引用][C] Detection of Sink Hole Attack Using Decision Tree in Manet

R Wandra, P Kumar, A Suman - 2019