Secure and scalable blockchain-based federated learning for cryptocurrency fraud detection: A systematic review

AA Ahmed, O Alabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the wide adoption of cryptocurrency, blockchain technologies have become the
foundation of such digital currencies. However, this adoption has been accompanied by a …

A real-time network traffic classifier for online applications using machine learning

AA Ahmed, G Agunsoye - Algorithms, 2021 - mdpi.com
The increasing ubiquity of network traffic and the new online applications' deployment has
increased traffic analysis complexity. Traditionally, network administrators rely on …

Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks

MP Arthur, K Kannan - Wireless Networks, 2016 - Springer
Multicast communication of mobile ad hoc networks (MANET), rather than multiple unicast
communication, delivers common content to more than one receiver at a time. Due to cutting …

[PDF][PDF] An efficient and reliable core-assisted multicast routing protocol in mobile Ad-Hoc network

F Khan, S Abbas, S Khan - International journal of …, 2016 - pdfs.semanticscholar.org
Mobile ad-hoc network is a collection of mobile nodes that are connected wirelessly forming
random topology through decentralized administration. In Mobile ad-hoc networks …

Secure multicast routing protocols in mobile ad‐hoc networks

AA Moamen, HS Hamza… - International Journal of …, 2014 - Wiley Online Library
SUMMARY A mobile ad‐hoc network (MANET) is a collection of autonomous nodes that
communicate with each other by forming a multi‐hop radio network. Routing protocols in …

Ant Colony Optimization based multicast routing algorithm for mobile ad hoc networks

N Anwar, H Deng - 2015 advances in wireless and optical …, 2015 - ieeexplore.ieee.org
Multicasting in Mobile Ad hoc wireless Networks (MANETs) is a big challenge and a
significant issue. Due to limited bandwidth and dynamic nature of ad hoc wireless networks …

MANET: IMPROVED SECURED ROUTING FOR AODV

P Shah, O Prakash, K Balaji, SK Shukla… - 2022 International …, 2022 - ieeexplore.ieee.org
Various routing methods and approaches are being integrated into wireless networks,
making it a topic for future investigation. The two primary wireless routing issues under …

Resilient PUMA (protocol for unified multicasting through announcement) against internal attacks in mobile ad hoc networks

AM Pushpa, K Kathiravan - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
In Mobile Ad hoc Networks, entire communication solely depends on multi-hop routing in
order to cover the larger area through wireless medium. When MANET is applicable for …

Secure multicast routing protocol against internal attacks in mobile ad hoc networks

AM Pushpa, K Kathiravan - 2013 7th IEEE GCC Conference …, 2013 - ieeexplore.ieee.org
Multicast communication in Mobile Ad Hoc Networks (MANET) has been used for group
communication-based applications such as battlefield, rescue-field and emergency …

Intelligent internal stealthy attack and its countermeasure for multicast routing protocol in MANET

MP Arthur, K Kannan - ETRI Journal, 2015 - Wiley Online Library
Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to
its routing structure and high scalability of its participants. Though existing intrusion …