Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET

R Reka, R Karthick, RS Ram, G Singh - Computers & Security, 2024 - Elsevier
Designing of intrusion detection system (IDS), and mobile ad hoc networks (MANET)
prevention technique with examined detection rate, memory consumption with minimum …

A deep learning-based intrusion detection approach for mobile Ad-hoc network

R Meddeb, F Jemili, B Triki, O Korbaa - Soft Computing, 2023 - Springer
The goal of the paper is to present a Stacked autoencoder approach for enhancing Intrusion
Detection Systems (IDSs) in Mobile Ad-Hoc Networks (MANETs). The paper proposes a …

DIWGAN optimized with Namib Beetle Optimization Algorithm for intrusion detection in mobile ad hoc networks

B Krishnasamy, L Muthaiah… - IETE Journal of …, 2023 - Taylor & Francis
Mobile ad hoc network (MANET) plays a major role in wireless devices such as defense and
flooding. Despite their smart applications, MANET faces more security issues than traditional …

An Overview of Game Theory Approaches for Mobile Ad-hoc Networks' Security

H Messabih, CA Kerrache, Y Cheriguene… - IEEE …, 2023 - ieeexplore.ieee.org
The issue of cybersecurity has gained significant prominence in the context of safeguarding
the privacy and integrity of information, especially with the increasing prevalence of …

A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET

R Saravanan, K Suresh, SS Arumugam - The Journal of Supercomputing, 2023 - Springer
Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method
comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network …

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Applied Intelligence, 2023 - Springer
A mobile ad-hoc network is a small and temporary network. This network has a different
working principle and structure than wired networks. A source node transfers data to the …

FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm

D Hemanand, NS Ram, DS Jayalakshmi - Wireless Personal …, 2023 - Springer
Abstract Mobile Ad-hoc Network is a decentralized wireless network which is drastically
growing day by day. It can be vulnerable to several threats and attacks, namely wormhole …

Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm

SSM Vincent, N Duraipandian - Expert Systems with Applications, 2024 - Elsevier
Abstract WSN (Wireless Sensor Network) is considered as one of the promising
technologies which are utilized in various fields for various applications. Along with it …

Adaptive Marine Predator Optimization Algorithm (AOMA)-Deep Supervised Learning Classification (DSLC) Based IDS Framework for MANET Security

MS Sheela, AG Soundari, A Mudigonda… - Intelligent and …, 2024 - ieeexplore.ieee.org
Due to the dynamic nature and node mobility, assuring the security of Mobile Ad-hoc
Networks (MANET) is one of the difficult and challenging tasks today. In MANET, the …

Multi-objective based route selection approach using AOMDV in MANET

M Saxena, S Dutta, B K. Singh, S Neogy - SN Computer Science, 2023 - Springer
Mobile ad hoc networks (MANETs) are comprised of wireless mobile nodes and are gaining
popularity due to their ease of deployment, low cost, and simple communication. However …