SA Alghamdi - International Journal of Information Security, 2022 - Springer
Abstract 5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues in MANETs. Security …
The decentralized administration and the lack of an appropriate infrastructure causes the MANET prone to attacks. The attackers play on the vulnerable characteristics of the MANET …
V Deshpande - Machine Learning Applications in …, 2021 - yashikajournals.com
This paper presented a layered Intrusion Detection System (IDS) for attack detection in the network. The developed model comprises of the Multi-Class Hybrid Ensemble Learning in …
J Kaur, S Kaur - Cluster Computing, 2021 - Springer
Abstract Recently Mobile adhoc networks (MANETs) have received the great attention of researchers as these models provide a wide range of applications. But MANET nodes are …
The Dynamic on demand network formation feature of MANET tend to have its biggest the vulnerability that infect the process of route establishment using routing algorithms and …
NR Marathe, SK Shinde - … and Networks: Proceedings of GUCON 2019, 2020 - Springer
MANET is well known for its inherent feature of on-demand ad hoc establishment of network. This makes MANET a suitable option for many applications like Disaster management …
H Souissi, M Mahamat, G Jaber… - 2022 International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) has attracted attention by projecting the vision of a global infrastructure on a network of physical objects, enabling connectivity at any time and place to …
The advent growth of wireless networks and their applications in different fields has been more prominent in the previous few years and specifically mobile ad-hoc networks …
With the growth in ad hoc devices, mobile ad hoc networks (MANETs) are extensively employed to realize different kinds of real-time applications. However, ad hoc devices suffer …