Tumbe Group of International Journals

References


  1. Kavitha, G. (2018). Qos improvement based security enhancement for link activity monitoring service in mobile ad hoc network. Cluster Computing.
  2. Janani, V. S., & Manikandan, M. S. K. (2017). Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks. Wireless Personal Communications, 97(4), 6131–6150.
  3. Krishnan, R.S., Julie, E.G., Robinson, Y.H., Kumar, R., Son, L., Tuan, T.A., & Long, H.V. (2020). Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Networks, 26, 1275-1289.
  4. Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks. Wireless Personal Communications.
  5. Janani, V.S., & Manikandan, M.S. (2020). Hexagonal Clustered Trust Based Distributed Group Key Agreement Scheme in Mobile Ad Hoc Networks. Wireless Personal Communications, 1-20.
  6. Kavitha, T., & Muthaiah, R. (2018). A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks. Cluster Computing.
  7. Desai, A. M., & Jhaveri, R. H. (2018). Secure routing in mobile Ad hoc networks: a predictive approach. International Journal of Information Technology.
  8. Ponguwala, Maitreyi & Rao, Sreenivasa. (2019). E2-SR: A Novel Energy Efficient Secure Routing Scheme to Protect MANET from Adversaries in Internet of Things. IET Communications. 13.
  9. Veeraiah, N., & Krishna, B. T. (2020). An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evolutionary Intelligence.
  10. Ochola, E.O., Mejaele, L., Eloff, M.M., & Poll, J. (2017). Manet Reactive Routing Protocols Node Mobility Variation Effect in Analysing the Impact of Black Hole Attack.
  11. Khan, B. U. I., Anwar, F., Olanrewaju, R. F., Pampori, B. R., & Mir, R. N. (2020). A Game Theory-based strategic approach to ensure reliable data transmission with optimized network operations in Futuristic Mobile Adhoc Networks. IEEE Access, 1–1.
  12. Kanagasundaram, H., & A, K. (2018). EIMO-ESOLSR: Energy Efficient and Security-Based Model for OLSR Routing Protocol in Mobile Ad-Hoc Network. IET Communications.
  13. Mehrkanoon, S., Alzate, C., Mall, R., Langone, R., & Suykens, J. A. (2014): Multiclass semisupervised learning based upon kernel spectral clustering. IEEE transactions on neural networks and learning systems, 26(4), pp.720-733.
  14. Feng, Y., Teng, G. F., Wang, A. X., & Yao, Y. M. (2007, September). Chaotic inertia weight in particle swarm optimization. In Innovative Computing, Information and Control, 2007. ICICIC’07. Second International Conference on(pp. 475-475). IEEE.
  15. Alowish, M., Shiraishi, Y., Takano, Y., Mohri, M., & Morii, M. (2020): Stabilized Clustering Enabled V2V Communication in an NDNSDVN Environment for Content Retrieval. IEEE Access, 8, pp.135138-135151.
  16.    Haridas,S & Rama Prasath,A (2020). Enhancement of Network Lifetime in MANET: Improved Particle Swarm Optimization for Delayless and Secured Geographic Routing. Jour of Adv Research in Dynamical & Control Systems, Vol. 12, 07-Special Issue, 2020
  17.     Haridas.S, A.Rama Prasath (2021), Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET, Indian Journal of Computer Science and Engineering (IJCSE), ISSN:0976-Vol. 12 No. 5 Sep-Oct 2021. 5166 DOI: 0.21817/ indjcse/2021/ v12i5/211205158.
  18. Alowish, M., Shiraishi, Y., Takano, Y., Mohri, M., & Morii, M. (2020): Stabilized Clustering Enabled V2V Communication in an NDNSDVN Environment for Content Retrieval. IEEE Access, 8, pp.135138-135151.
  19. Ding, R., Xu, Y., Gao, F., Shen, X., & Wu, W. Deep reinforcement earning for router selection in a network with heavy traffic, IEEE Access, vol. 7, pp. 37 109–37 120, Apr. 2019.
  20. Koushik, A. M., Hu, F., & Kumar, S. Deep Q -learning-based node positioning for throughput-optimal communications in dynamic UAV swarm network, IEEE TCCN, vol. 5, no. 3, pp. 554–566, Sept. 2019.
  21. Hu, T., & Fei, Y. Qelar: A machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks, IEEE Trans. Mobile Comput., vol. 9, no. 6, pp. 796–809, Jun. 2010.


Sign In  /  Register

Most Downloaded Articles

Acquire employability in Indian Sinario

The Pink Sonnet

ಸರ್ಕಾರಿ ದೇಗುಲ

Department of Mathematics @ GFGC Tumkur

Knowledge and Education- At Conjecture




© 2018. Tumbe International Journals . All Rights Reserved. Website Designed by ubiJournal