A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

Mobility aware quality enhanced cluster based routing protocol for mobile ad-hoc networks using hybrid optimization algorithm

K Karthick, R Asokan - Wireless Personal Communications, 2021 - Springer
Abstract Wireless Sensor Networks (WSN) utilizes more nodes to forward messages and
information from source node to destination node and these nodes are battery-powered …

Watchdog malicious node detection and isolation using deep learning for secured communication in MANET

AS Narmadha, S Maheswari, SN Deepa - Automatika: časopis za …, 2023 - hrcak.srce.hr
Sažetak Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by
connecting or leaving nodes to and from the network without any fixed infrastructure. These …

A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET

R Saravanan, K Suresh, SS Arumugam - The Journal of Supercomputing, 2023 - Springer
Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method
comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network …

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Applied Intelligence, 2023 - Springer
A mobile ad-hoc network is a small and temporary network. This network has a different
working principle and structure than wired networks. A source node transfers data to the …

Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET

S Dilipkumar, M Durairaj - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Abstract Design of intrusion detection, and MANET prevention mechanism, with scrutinized
detection rate, memory consumption with minimal overhead are crucial research concerns …

Euler phi function and gamma function based elliptic curve encryption for secured group communication

S Viswanathan, RS Bhuvaneswaran… - Wireless Personal …, 2022 - Springer
In this paper, we propose a new clustering, encryption and trust modeling based energy
aware routing secured algorithm for performing secured data communication in Wireless …

A study review on gray and black hole in mobile Ad Hoc networks (MANETs)

MM Hamdi, AF Flaih, ML Jameel… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Unlike other types of networks, a MANET is self-configuring and does not need centralized
management. Anywhere and at any moment, a MANET may be established. Mobile ad hoc …

A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)

KS Prasanna, B Ramesh - Wireless Personal Communications, 2023 - Springer
In wireless communication systems, Wireless ad hoc network plays a significant role in the
research domain. MANET is also an ad hoc network that build a temporary network to …

Tanimoto support vector regressive linear program boost based node trust evaluation for secure communication in MANET

J Anitha Josephine, S Senthilkumar - Wireless Personal Communications, 2021 - Springer
Mobile ad hoc network (MANET) is an infrastructure-less and self-configuring where the
Mobile Nodes (MN) moved autonomously via the wireless network interfaces within the …