Loading…
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network
Thirunavukkarasu, V., Senthil Kumar, A., Prakasam, P.
Published in Peer-to-peer networking and applications (01.09.2022)
Published in Peer-to-peer networking and applications (01.09.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment
Hamid Hassan, Mustafa, Ahmed Jubair, Mohammed, A. Mostafa, Salama, Kamaludin, Hazalila, Mustapha, Aida, Md. Fudzee, Mohd Farhan, Mahdin, Hairulnizam
Published in IAES International Journal of Artificial Intelligence (01.06.2020)
Published in IAES International Journal of Artificial Intelligence (01.06.2020)
Get full text
Journal Article
Loading…
Loading…
The Criteria Require for Cluster Head Gateway Selection in Integrated Mobile Ad hoc Network
Bagwari, Ashish, Jee, Raman
Published in International journal of engineering science and technology (01.07.2011)
Get full text
Published in International journal of engineering science and technology (01.07.2011)
Journal Article
Loading…
Byzantine Agreement on Mobile Ad-Hoc Network
Wang, S.C., Yang, W.P., Cheng, C.F.
Published in 2004 IEEE International Conference on Networking, Sensing and Control (2004)
Published in 2004 IEEE International Conference on Networking, Sensing and Control (2004)
Get full text
Conference Proceeding
Loading…
Secrecy Throughput of MANETs Under Passive and Active Attacks
Yingbin Liang, Poor, H. V., Lei Ying
Published in IEEE transactions on information theory (01.10.2011)
Published in IEEE transactions on information theory (01.10.2011)
Get full text
Journal Article
Loading…
A weight-value algorithm for finding connected dominating sets in a MANET
Leu, Seiven, Chang, Ruay-Shiung
Published in Journal of network and computer applications (01.09.2012)
Published in Journal of network and computer applications (01.09.2012)
Get full text
Journal Article
Loading…
Loading…
Loading…
A distributed secret share update scheme with public verifiability for ad hoc network
Zhenhua, Chen, Shundong, Li, Qianhong, Wu, Qiong, Huang
Published in Security and communication networks (25.05.2015)
Published in Security and communication networks (25.05.2015)
Get full text
Journal Article
Loading…
A survey of attacks in mobile ad hoc networks
Meddeb, Rahma, Triki, Bayrem, Jemili, Farah, Korbaa, Ouajdi
Published in 2017 International Conference on Engineering & MIS (ICEMIS) (01.05.2017)
Published in 2017 International Conference on Engineering & MIS (ICEMIS) (01.05.2017)
Get full text
Conference Proceeding
Loading…
Loading…
MASS: Editor for mobile ad-hoc network scenarios
Cabrero, S, Pañeda, Xabiel Garcia, Melendi, D, García, Roberto
Published in 2010 IEEE Globecom Workshops (01.12.2010)
Published in 2010 IEEE Globecom Workshops (01.12.2010)
Get full text
Conference Proceeding
Loading…
Loading…
An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models
Miskeen, Guzlan M. A., Kouvatsos, Demetres D., Habibzadeh, Esmaeil
Published in Wireless personal communications (01.06.2013)
Published in Wireless personal communications (01.06.2013)
Get full text
Journal Article
Conference Proceeding