2020
DOI: 10.1007/s11277-020-07316-z
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The D_best value is recalculated and the particle's location is updated as a result of the foregoing procedure [22]. The distance between the cluster's centre and its surrounding particles is used as a measure of the cluster's fitness.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…The D_best value is recalculated and the particle's location is updated as a result of the foregoing procedure [22]. The distance between the cluster's centre and its surrounding particles is used as a measure of the cluster's fitness.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Vatambeti [19] developed the Grey Wolf Trust Accumulation (GWTA) approach to obtain trustful data transmission. The trust accumulation approach was accomplished in the grey wolf optimization to improve the identification and prevention approaches.…”
Section: Literature Surveymentioning
confidence: 99%