Journal articles on the topic 'MANETs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MANETs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textEltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (April 22, 2023): 1956. http://dx.doi.org/10.3390/electronics12091956.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textDebnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.
Full textKurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.
Full textKanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.
Full textNourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (January 20, 2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.
Full textAl Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (December 8, 2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textS, Sangheethaa. "A Comparative Study for Block Chain Applications in the MANET." International Journal on AdHoc Networking Systems 13, no. 03 (July 27, 2023): 1–7. http://dx.doi.org/10.5121/ijans.2023.13301.
Full textHanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (October 10, 2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.
Full textDhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (December 30, 2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textA.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (July 8, 2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.
Full textGoyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (August 5, 2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.
Full textHaglan, Hussein M., Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd Zainuri Saringatb, Hosam Alhakami, and Wajdi Alhakami. "Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment." Bulletin of Electrical Engineering and Informatics 10, no. 1 (February 1, 2021): 434–40. http://dx.doi.org/10.11591/eei.v10i1.2516.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, Rashidah Funke Olanrewaju, Miss Laiha B. Mat Kiah, Md Arafatur Rahman, and Zuriati Janin. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (October 30, 2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Full textHanin, Moulay Hicham, Mohamed Amnai, and Youssef Fakhri. "New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2134. http://dx.doi.org/10.11591/ijece.v11i3.pp2134-2142.
Full textZaid Ihsan Nouri. "Comparative analysis of routing protocols for wireless area networks and evaluation of the effectiveness." Jornual of AL-Farabi for Engineering Sciences 1, no. 2 (December 1, 2022): 9. http://dx.doi.org/10.59746/jfes.v1i2.48.
Full textVelagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (November 25, 2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.
Full textSoni, S., and J. S. Shah. "Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks." Engineering, Technology & Applied Science Research 7, no. 3 (June 12, 2017): 1681–84. http://dx.doi.org/10.48084/etasr.1167.
Full textIslam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.
Full textM. Elbanaa, Alaa, Mahmoud Y. Shams, Roaya I. Abdelfatah, and Mohamed E. Nasr. "Empowering Manets with Advanced Multimodal Biometric Authentication and Encryption." International Journal of Network Security & Its Applications 16, no. 2 (March 29, 2024): 17–27. http://dx.doi.org/10.5121/ijnsa.2024.16202.
Full textManwal, Manika. "Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (December 15, 2020): 2032–40. http://dx.doi.org/10.17762/turcomat.v11i3.13600.
Full textGangwar, Sanjeev. "Mobile Ad Hoc Networks: Comparasion of Multipath Routing Protocols with Unipath Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 193–99. http://dx.doi.org/10.24297/ijct.v5i3.3520.
Full textFilipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.
Full textAbdali, Taj-Aldeen Naser, Rosilah Hassan, Ravie Chandren Muniyandi, Azana Hafizah Mohd Aman, Quang Ngoc Nguyen, and Ahmed Salih Al-Khaleefa. "Optimized Particle Swarm Optimization Algorithm for the Realization of an Enhanced Energy-Aware Location-Aided Routing Protocol in MANET." Information 11, no. 11 (November 15, 2020): 529. http://dx.doi.org/10.3390/info11110529.
Full textKanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (January 2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.
Full textAhirwal, Ramratan, Nitesh Kumar Chaurasiya, and Yogendra Kumar Jain. "An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 15, 2013): 3147–57. http://dx.doi.org/10.24297/ijct.v12i1.3368.
Full textAl-Shehri, Salman, and Pavel Loskot. "Enhancing Reliability of Tactical MANETs by Improving Routing Decisions." Journal of Low Power Electronics and Applications 8, no. 4 (November 28, 2018): 49. http://dx.doi.org/10.3390/jlpea8040049.
Full textBhasker Gangadhar Koshidgewar. "A Study on Detect and Prevent Network strike in MANETS." international journal of engineering technology and management sciences 7, no. 1 (2023): 350–55. http://dx.doi.org/10.46647/ijetms.2023.v07i01.053.
Full textBhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (May 30, 2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full textSoni, S., and J. S. Shah. "QoS frameworks for Multimedia Traffic in Mobile Adhoc Networks: A Comparative Review." Engineering, Technology & Applied Science Research 7, no. 3 (June 12, 2017): 1708–12. http://dx.doi.org/10.48084/etasr.1131.
Full textBarolli, Leonard, Akio Koyama, Takuo Suganuma, and Norio Shiratori. "GAMAN: A GA Based QoS Routing Method for Mobile Ad-Hoc Networks." Journal of Interconnection Networks 04, no. 03 (September 2003): 251–70. http://dx.doi.org/10.1142/s0219265903000866.
Full textSingh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.
Full textKaur, Rajveer, Dr Shaveta Rani, and Dr Paramjeet Singh. "Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 214–19. http://dx.doi.org/10.24297/ijct.v5i3.3522.
Full textRAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (September 30, 2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.
Full textAbdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (November 4, 2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.
Full textVeerasamy, Anitha, Srinivasa Rao Madane, K. Sivakumar, and Audithan Sivaraman. "Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs." Scientific World Journal 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/3596345.
Full textJim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Australian Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61. http://dx.doi.org/10.18080/ajtde.v5n2.100.
Full textJim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61–74. http://dx.doi.org/10.18080/jtde.v5n2.100.
Full textRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Full textMishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.
Full textKancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (October 26, 2022): 3480. http://dx.doi.org/10.3390/electronics11213480.
Full textL. Esteban, Allen Paul. "Anomaly Recognition in Wireless Ad-hoc Network by using Ant Colony Optimization and Deep Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (May 20, 2023): 395–403. http://dx.doi.org/10.17762/ijritcc.v11i5.6692.
Full textChauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.
Full textChatheka, Ngazi Mangazi, and Selvam Glorindal. "Secure and efficient data transfer in AODV routing protocol using RSA encryption." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 1. http://dx.doi.org/10.26634/jdf.1.1.19389.
Full text