2016 International Conference on ICT in Business Industry &Amp; Government (ICTBIG) 2016
DOI: 10.1109/ictbig.2016.7892688
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review on detection of wormhole attack in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…It is hard to state that one arrangement is appropriate in all circumstances. However, utilizing various methodologies anticipated in [22], a more grounded discovery system can be conceived for forestalling wormhole attack in systems.…”
Section: Related Workmentioning
confidence: 99%
“…It is hard to state that one arrangement is appropriate in all circumstances. However, utilizing various methodologies anticipated in [22], a more grounded discovery system can be conceived for forestalling wormhole attack in systems.…”
Section: Related Workmentioning
confidence: 99%
“…In the equation (1) and (2), (2) represents the total input of the ℎ unit of layer 2 .Similarly, the net output of ℎ unit of the output layer can be shown as equation (3),…”
Section: =1mentioning
confidence: 99%
“…Similarly, the impact of the change in weight ( (2) ) , associated with bias and the neurons of the output layer, on error ( (3) ) occurred in output layer is,…”
Section: Back Propagation Of the Annmentioning
confidence: 99%
See 2 more Smart Citations