2020
DOI: 10.14445/22315381/ijett-v68i11p213
|View full text |Cite
|
Sign up to set email alerts
|

Multistage Security Detection in Mobile Ad-Hoc Network (MANET)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In convolution operation, when the network data of the original expressway networking system is shared, the information data characteristics will be strengthened, and the noise will be weakened. CNN uses this feature to strengthen the inherent characteristics and fuzzy secondary characteristics of the network information of the expressway networking system 26 . Each convolution layer contains two processes: convolution and nonlinear activation.…”
Section: Reasoning and Traceability Methods Of Information Security E...mentioning
confidence: 99%
See 1 more Smart Citation
“…In convolution operation, when the network data of the original expressway networking system is shared, the information data characteristics will be strengthened, and the noise will be weakened. CNN uses this feature to strengthen the inherent characteristics and fuzzy secondary characteristics of the network information of the expressway networking system 26 . Each convolution layer contains two processes: convolution and nonlinear activation.…”
Section: Reasoning and Traceability Methods Of Information Security E...mentioning
confidence: 99%
“…CNN uses this feature to strengthen the inherent characteristics and fuzzy secondary characteristics of the network information of the expressway networking system. 26 Each convolution layer contains two processes: convolution and nonlinear activation. The network information features of the expressway networking system in the current layer can be obtained through the convolution operation between the convolution kernel and the output features or original features of the previous layer.…”
Section: ) Convolution Layermentioning
confidence: 99%
“…Therefore, the source node will initiate route request (RREQ) and then transmit a packet through various network nodes to the appropriate destination. AODV employs four various types of messages, Route Request (RREQ), Route Reply (RREP), Route Error (RERR), and hello (HELLO), to discover the shortest path to the destination [27].…”
Section: Overview Of Aodvmentioning
confidence: 99%
“…The network layer is susceptible to different types of cyberattack and threats that can be used to disrupt the legitimate communications such as Denial of Service (DoS) attacks [2] that occur in online business and transaction systems. DoS attacks have become the major threat to current information security and network resources due to the deliberate exploitation of system vulnerabilities of a victim at the required time [3], [4]. DoS as the name suggests the attacker prevents or denies the services of the authorized user.…”
Section: Introductionmentioning
confidence: 99%