2021
DOI: 10.1007/s12652-021-03169-x
|View full text |Cite
|
Sign up to set email alerts
|

Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…A CEGS-GDBC classifier or multi-attack intrusion detection was suggested. 24 In order to develop a clustering method for CH election in MANET that was motivated by Dual Network Centrality, the study focuses on the problems of energy and node mobility. Epilson Greedy Swarm Optimization was used for compact cluster building.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A CEGS-GDBC classifier or multi-attack intrusion detection was suggested. 24 In order to develop a clustering method for CH election in MANET that was motivated by Dual Network Centrality, the study focuses on the problems of energy and node mobility. Epilson Greedy Swarm Optimization was used for compact cluster building.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, the below equation may be used to determine the distance e l,i among node l and CH i at the start of round q. Provided deterministic y l 0 ð Þ, z l 0 ð Þ, t l u ð Þ, and θ l u ð Þ, e l,i may be derived in a recursive way by considering ( 22)-( 23) into (24).…”
Section: Average Pdr Analysismentioning
confidence: 99%
“…The disadvantage of this method is that the process mainly depends on each classifier model. 40 To provide trust efficient information in an infrastructure-less environment CREDIT-BASED secure scheme is evaluated. It includes the specific characteristics and features of attacking nodes.…”
Section: Related Workmentioning
confidence: 99%
“…By researching all these methods we identify that there is a problem of unsecure routing in MANET which is not analyzed accurately and it access low delivery ratio of packets and increase the delay time of end-end detection. 40,41,44 Therefore, in this proposed framework, we provide some advanced techniques and trust detection strategies to overcome the insecurity problem and prefer a trusted reliable routing in MANET. Loss of some information between source node and destination node.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation