A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network
Authors
Keywords
-
Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-04-09
DOI
10.1007/s11277-020-07316-z
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network
- (2020) Mohammad Bany Taha et al. Transactions on Emerging Telecommunications Technologies
- Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks
- (2020) Elbasher Elmahdi et al. Journal of Information Security and Applications
- An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks
- (2019) M. Vigenesh et al. COMPUTERS & ELECTRICAL ENGINEERING
- Adaptive wireless power transfer in mobile ad hoc networks
- (2019) Adelina Madhja et al. Computer Networks
- Energy and Velocity Based Tree Multicast Routing in Mobile Ad-Hoc Networks
- (2019) Abu Sufian et al. WIRELESS PERSONAL COMMUNICATIONS
- Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes
- (2019) Trilok Kumar Saini et al. Ad Hoc Networks
- CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks
- (2019) Varun Kumar Sharma et al. Future Generation Computer Systems-The International Journal of eScience
- Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET
- (2019) Kapil Juneja WIRELESS PERSONAL COMMUNICATIONS
- Identification of influential users in social network using gray wolf optimization algorithm
- (2019) Ahmad Zareie et al. EXPERT SYSTEMS WITH APPLICATIONS
- A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks
- (2018) S. Vimala et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Mobility prediction in mobile ad hoc networks using eye of coverage approach
- (2018) U. Palani et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs
- (2018) P. Balaji Srikaanth et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
- (2018) K. Bala et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Denial of service attack solution in OLSR based manet by varying number of fictitious nodes
- (2018) R. Bhuvaneswari et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency
- (2018) Yaser M. Khamayseh et al. Sustainable Computing-Informatics & Systems
- FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks
- (2018) Y. Harold Robinson et al. Journal of Ambient Intelligence and Humanized Computing
- A realistic mobility model with irregular obstacle constraints for mobile ad hoc networks
- (2017) Wei Wang et al. WIRELESS NETWORKS
- Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
- (2017) Vishvas Haridas Kshirsagar et al. WIRELESS PERSONAL COMMUNICATIONS
- A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks
- (2017) Mina Ghafouri vaighan et al. Journal of Ambient Intelligence and Humanized Computing
- A novel approach for mitigating gray hole attack in MANET
- (2016) Shashi Gurung et al. WIRELESS NETWORKS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More