Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector …

AR Patil, GM Borkar - IET Wireless Sensor Systems, 2023 - Wiley Online Library
In a mobile ad hoc network (MANET), all nodes are communicated with one another across
wireless networks to create a temporary network without the support of centralised …

[PDF][PDF] MOpt Shield: An Intrusion Detection System based on Meld Optimization Algorithm to mitigate Amalgam Attacks

J Kaur, R Talwar, AK Goel - Indian Journal …, 2021 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: To mitigate network from amalgam attacks, this study is
focussed on designing an efficient approach that can prevent the networks from intruders …

[PDF][PDF] Optimized Intrusion Detection System to Mitigate Hybrid Attacks

J Kaur, R Talwar, B Kaur - kalaharijournals.com
As the need for technology grows, so do the risks associated with it, such as confidentiality,
data loss, and other issues in the realm of communication. Due to its dynamic nature, the …