Journal articles on the topic 'Mobile Ad Hoc Networks (MANETs)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile Ad Hoc Networks (MANETs).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Gurvir, and Tajinder Kaur. "Termite-Based Approach for Wormhole Attack Detection in Mobile Ad-Hoc Networks (MANETs)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42378.
Full textKumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks." International Journal of Handheld Computing Research 7, no. 1 (2016): 26–76. http://dx.doi.org/10.4018/ijhcr.2016010103.
Full textChauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.
Full textFilipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.
Full textSingh, Kirti, and Poonam Yadav. "Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (2012): 351–53. http://dx.doi.org/10.24297/ijct.v3i3a.2937.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textIslam, Burhan Ul, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, and Mashkuri Yaacob. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp832-842.
Full textBurhan, Ul Islam Khan, Funke Olanrewaju Rashidah, Anwar Farhat, Rahman Najeeb Athaur, and Yaacob Mashkuri. "A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 832–42. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842.
Full textShreya Mane. "Conceptual Aspects on Mobile Ad-Hoc Network System." international journal of engineering technology and management sciences 6, no. 6 (2022): 555–64. http://dx.doi.org/10.46647/ijetms.2022.v06i06.095.
Full textKanellopoulos, Dimitris, and Francesca Cuomo. "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks." Electronics 10, no. 4 (2021): 364. http://dx.doi.org/10.3390/electronics10040364.
Full textMohamed, Elboukhari1 Mostafa Azizi1 and Abdelmalek Azizi2 3. "COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Computer-Aided Technologies (IJCAx) 02, apr (2018): 01–11. https://doi.org/10.5281/zenodo.1346127.
Full textMohamed, Elboukhari1 Mostafa Azizi1 and Abdelmalek Azizi2 3. "COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Computer-Aided technologies (IJCAx) 2, no. 2 (2023): 1. https://doi.org/10.5281/zenodo.8323414.
Full textVijay U. Rathod. "To Reduce Channel Interference in Mobile Ad-Hoc Networks through LSTM and GRU Prediction Algorithms." Advances in Nonlinear Variational Inequalities 27, no. 2 (2024): 499–516. http://dx.doi.org/10.52783/anvi.v27.1342.
Full textBhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.
Full textAbdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.
Full textMohammed, Aziz Ahmed*1 Mohammed Sirajuddin2 &. Nazia Kouser3. "REDUCING THE NETWORK OVERHEAD BY IMPLEMENTING DISTRIBUTED KEY MECHANISM IN MANETS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 8 (2018): 104–10. https://doi.org/10.5281/zenodo.1342512.
Full textK.Thamizhmaran. "Wireless Ad hoc Reactive Routing Protocols in Mobile Ad hoc Networks." Journal of Optoelectronics and Communication 7, no. 1 (2025): 34–45. https://doi.org/10.5281/zenodo.15152925.
Full textKhanchandani, Shailesh Kumar. "A COMPARATIVE ANALYSIS OF PROACTIVE ROUTING PROTOCOLS (DSDV, OLSR) & REACTIVE ROUTING PROTOCOLS (AODV, DSR) IN MANET USING NS-3." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30773.
Full textCai, Zheng Ce. "Studies on the Secure Routing Protocols of Mobile AD Hoc Networks." Advanced Materials Research 734-737 (August 2013): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3203.
Full textNourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.
Full textAlnabhan, Mohammad M. "Advanced GPSR in Mobile Ad-hoc Networks (MANETs)." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 107. http://dx.doi.org/10.3991/ijim.v14i18.16661.
Full textMOHAMMADI, HOSSEIN, EHSAN NEDAAEE OSKOEE, MOHSEN AFSHARCHI, NASSER YAZDANI, and MUHAMMAD SAHIMI. "A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS." International Journal of Modern Physics C 20, no. 12 (2009): 1871–902. http://dx.doi.org/10.1142/s0129183109014795.
Full textManwal, Manika. "Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2032–40. http://dx.doi.org/10.17762/turcomat.v11i3.13600.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full textZaid Ihsan Nouri. "Comparative analysis of routing protocols for wireless area networks and evaluation of the effectiveness." Jornual of AL-Farabi for Engineering Sciences 1, no. 2 (2022): 9. http://dx.doi.org/10.59746/jfes.v1i2.48.
Full textSujithra Devi, Mrs L. D., Mrs A. Praveena, Mrs B. Reena, Mrs G. Anandhi, and Mrs M. Sowmya. "Mobile Ad-hoc Networks: A Survey on multipath routing protocols." Journal of University of Shanghai for Science and Technology 24, no. 1 (2022): 244–52. http://dx.doi.org/10.51201/jusst/21/121049.
Full textKanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.
Full textPragya Kabra, Et al. "Techniques for Diversified Optimization of Routing Algorithms in Mobile Ad-Hoc Wireless Connections." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8 (2023): 569–74. http://dx.doi.org/10.17762/ijritcc.v11i8.10057.
Full textPunya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.
Full textPhijik, Battula, and Chakunta Venkata Guru Rao. "Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks." Ingénierie des systèmes d information 26, no. 6 (2021): 559–67. http://dx.doi.org/10.18280/isi.260606.
Full textDivya, K., and B. Srinivasan. "A Trust-Based Predictive Model for Mobile Ad Hoc Networks." International Journal on AdHoc Networking Systems 11, no. 03 (2021): 13–23. http://dx.doi.org/10.5121/ijans.2021.11302.
Full textKasem Mohammed, Abdulghani Saif, and Khalid Hamid Bilal. "Survey of mobile ad hoc networks (manets)." International Journal of Engineering and Computer Science 8, no. 02 (2019): 24484–90. http://dx.doi.org/10.18535/ijecs.v8i02.4229.
Full textKadoch, Michel. "Recent Advances in Mobile Ad Hoc Networks." Electronics 10, no. 12 (2021): 1446. http://dx.doi.org/10.3390/electronics10121446.
Full textMishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.
Full textLi, Rong Xin, Chao Mei Zheng, and Ling Chai. "Study on Power-Aware Routing Mechanism in MANET." Applied Mechanics and Materials 263-266 (December 2012): 1100–1104. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1100.
Full textVelagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.
Full textFarooq, Aabid, and Jasdeep Singh. "Wireless Ad Hoc Network Routing Protocols Performance Evaluation under Security Attack." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 751–63. http://dx.doi.org/10.22214/ijraset.2023.48677.
Full textPatel, Ibrahim, Aisha Ruman Patel, S. Saravanan, D. Ganeshaperumal, and Kedarnath B. "Pre-Existing Mobile Ad Hoc Network Routing Protection." ECS Transactions 107, no. 1 (2022): 395–404. http://dx.doi.org/10.1149/10701.0395ecst.
Full textU., Kumaran, Ramachandran A., Jegan J., and K. Subramanian E. "Enhanced routing for secured ad-hoc network." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 2 (2020): 949–56. https://doi.org/10.11591/ijeecs.v19.i2.pp949-956.
Full textKaur, Ramanpreet, Dr Kavita Taneja, and Dr Harmunish Taneja. "COMPUTATIONAL INTELLIGENCE BASED ROUTING SOLUTIONS FOR MOBILE AD HOC NETWORKS." International Journal of Engineering Science and Humanities 14, Special Issue 1 (2024): 32–37. http://dx.doi.org/10.62904/a0485344.
Full textSirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textKONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.
Full textMohamed, Elboukhari, Azizi Mostafa, and Azizi Abdelmalek. "PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of UbiComp (IJU) 6, no. 2 (2022): 11. https://doi.org/10.5281/zenodo.7333209.
Full textMohamed, Elboukhari, Azizi Mostafa, and Azizi Abdelmalek. "PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 11. https://doi.org/10.5281/zenodo.8208445.
Full textK.Thamizhmaran. "Secure Hybrid Model for Mobile Ad-hoc Networks." Research and Review: VLSI Design, Tools and It's Application 1, no. 1 (2025): 37–45. https://doi.org/10.5281/zenodo.15153307.
Full textTiwari, Rovin, and Megha Nema. "Privacy Preserving Authentication Approaches over Mobile Ad-Hoc Networks." SMART MOVES JOURNAL IJOSCIENCE 5, no. 8 (2019): 10–13. http://dx.doi.org/10.24113/ijoscience.v5i8.288.
Full textS. Jeba, Shiny. "A review on application of MANET-IoT." i-manager's Journal on Mobile Applications and Technologies 9, no. 1 (2022): 28. http://dx.doi.org/10.26634/jmt.9.1.18922.
Full textRani, Seema, and Saurabh Charaya. "Performance Improvement of AODV in Wireless Networks using Reinforcement Learning Algorithms." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 734–41. http://dx.doi.org/10.17762/ijritcc.v11i9s.7746.
Full textRakesh, Kumar Pal*1 &. Dr. Deepali Gupta2. "A REVIEW OF SECURE ROUTING PROTOCOLS FOR IPV6 BASED MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 245–50. https://doi.org/10.5281/zenodo.1345598.
Full textMahdi, M. A., T. C. Wan, A. Mahdi, M. A. G. Hazber, and B. A. Mohammed. "A Multipath Cluster-Based Routing Protocol For Mobile Ad Hoc Networks." Engineering, Technology & Applied Science Research 11, no. 5 (2021): 7635–40. http://dx.doi.org/10.48084/etasr.4259.
Full text