Wu, W. C. (2020). Spectrum sensing in optical wireless communication network. Transactions on Emerging Telecommunications Technologies,1, e3716.
Google Scholar
Sultanuddin, S. J., & Ali Hussain, M. (2020). Token system-based efficient route optimization in mobile ad hoc network for v ehicular ad hoc network in smart city. Transactions on Emerging Telecommunications Technologies,1, e3853.
Google Scholar
Ur Rahman, H., et al. (2020). A community-based social P2P network for sharing human life digital memories. Transactions on Emerging Telecommunications Technologies,1, e3866.
Google Scholar
Sundar, R., & Kathirvel, A. (2020). Aggressively delivered mechanism over variable length density using a simulated annealing algorithm in mobile ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3863.
Google Scholar
Bany Taha, M., et al. (2020). TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3860.
Google Scholar
Robinson, Y. H., et al. (2019). FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(11), 4455–4472.
Google Scholar
Liu, S., et al. (2019). Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access,7, 21343–21358.
Google Scholar
Madhja, A., Nikoletseas, S., & Voudouris, A. A. (2019). Adaptive wireless power transfer in mobile ad hoc networks. Computer Networks,152, 87–97.
Google Scholar
Rath, M., et al. (2019). QTM: A QoS task monitoring system for mobile ad hoc networks. Recent Findings in Intelligent Computing Techniques (pp. 543–550). Singapore: Springer.
Google Scholar
Saini, T. K., & Sharma, S. C. (2019). Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes. Ad Hoc Networks,89, 58–77.
Google Scholar
Wang, W., et al. (2019). A realistic mobility model with irregular obstacle constraints for mobile ad hoc networks. Wireless Networks,25(2), 487–506.
Google Scholar
Elmahdi, E., Yoo, S. M., & Sharshembiev, K. (2020). Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications,51, 102425.
Google Scholar
Darwish, S. M., Elmasry, A., & Ibrahim, S. H. (2019). Optimal Shortest Path in Mobile Ad-Hoc Network Based on Fruit Fly Optimization Algorithm. International Conference on Advanced Machine Learning Technologies and Applications,1, 1.
Google Scholar
Banerjee, A., Dutta, P., & Sufian, A. (2019). Movement guided management of topology (MGMT) with balanced load in mobile ad hoc networks. International Journal of Information Technology,11(1), 149–158.
Google Scholar
Jamali, M. A. J. (2019). A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(1), 107–123.
MathSciNet
Google Scholar
Sufian, A., Banerjee, A., & Dutta, P. (2019). Energy and velocity based tree multicast routing in mobile Ad-Hoc networks. Wireless Personal Communications,107(4), 2191–2209.
Google Scholar
Sharma, V. K., Verma, L. P., & Kumar, M. (2019). CL-ADSP: Cross-layer adaptive data scheduling policy in mobile ad hoc networks. Future Generation Computer Systems,97, 530–563.
Google Scholar
Lavanya, P., Reddy, V. S. K., & Prasad, A. M. (2019). Simulation and QoS metrics comparison of routing protocols for mobile ad hoc networks using network simulator (pp. 567–575)., Microelectronics, Electromagnetics and Telecommunications Singapore: Springer.
Google Scholar
Palani, U., Suresh, K. C., & Nachiappan, A. (2019). Mobility prediction in mobile ad hoc networks using eye of coverage approach. Cluster Computing,22(6), 14991–14998.
Google Scholar
Zeng, B., Yao, L., & Wang, R. (2019). A reliable routing decision algorithm with minimal multicast power consumption in mobile wireless network. In IEEE 7th international conference on computer science and network technology (ICCSNT). IEEE.
Farheen, N. S. S., & Jain, A. (2020). Improved routing in MANET with optimized multi path routing fine-tuned with hybrid modeling. Journal of King Saud University-Computer and Information Sciences,1, 1.
Google Scholar
Kumar, H., et al. (2020). Study and design of route repairing mechanism in MANET. Design frameworks for wireless networks (pp. 123–149). Singapore: Springer.
Google Scholar
Juneja, K. (2020). Random-session and K-neighbour based suspected node analysis approach for cooperative blackhole detection in MANET. Wireless Personal Communications,110(1), 45–68.
Google Scholar
Islabudeen, M., & Devi, M. K. K. (2020). A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wireless Personal Communications,1, 1–32.
Google Scholar
Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks,24(2), 565–579. https://doi.org/10.1007/s11276-016-1353-5.
Article
Google Scholar
Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems,18, 90–100. https://doi.org/10.1016/j.suscom.2017.07.001.
Article
Google Scholar
Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications,100(2), 311–320. https://doi.org/10.1007/s11277-017-5070-x.
Article
Google Scholar
Bhuvaneswari, R., & Ramachandran, R. (2018). Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing. https://doi.org/10.1007/s10586-018-1723-0.
Article
Google Scholar
Jamal, T., & Butt, S. A. (2019). Malicious node analysis in MANETS. International Journal of Information Technology,11(4), 859–867. https://doi.org/10.1007/s41870-018-0168-2.
Article
Google Scholar
Srikaanth, P. B., & Nagarajan, V. (2019). Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs. Cluster Computing,22(6), 15541–15549. https://doi.org/10.1007/s10586-018-2698-6.
Article
Google Scholar
Zareie, A., Sheikhahmadi, A., & Jalili, M. (2020). Identification of influential users in social network using gray wolf optimization algorithm. Expert Systems with Applications,142, 112971.
Google Scholar
Ali Zardari, Z., et al. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet,11(3), 61.
Google Scholar
Pal, A., et al. (2020). An efficient load balanced stable multi-path routing for mobile ad-hoc network. Microsystem Technologies,1, 1–15.
Google Scholar
Vigenesh, M., & Santhosh, R. (2019). An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks. Computers & Electrical Engineering,74, 273–280.
Google Scholar
Vimala, S., Khanaa, V., & Nalini, C. (2019). A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. Cluster Computing,22(2), 4065–4074.
Google Scholar
Bala, K., Jothi, S., & Chandrasekar, A. (2019). An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis. Cluster Computing,22(6), 15205–15212.
Google Scholar
Moudni, H., et al. (2019). Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science,151, 1176–1181.
Google Scholar