2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials 2015
DOI: 10.1109/icstm.2015.7225388
|View full text |Cite
|
Sign up to set email alerts
|

DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…ere are two popular methods used in feature selection, namely, (1) the filter method (more suited for data mining) and (2) Journal of Computer Networks and Communications machine learning). Using the WEKA software tool, it was observed that the wrapper method was the best, because the starting number of features-twenty-six (26) in total-which were extracted by the Perl script "dataCleanerBetter.pl" was relatively small. Primarily, the problem at that stage was a machine learning problem as opposed to a data mining problem.…”
Section: Feature Extraction and Machine Learning (Wrapper Method)mentioning
confidence: 99%
See 1 more Smart Citation
“…ere are two popular methods used in feature selection, namely, (1) the filter method (more suited for data mining) and (2) Journal of Computer Networks and Communications machine learning). Using the WEKA software tool, it was observed that the wrapper method was the best, because the starting number of features-twenty-six (26) in total-which were extracted by the Perl script "dataCleanerBetter.pl" was relatively small. Primarily, the problem at that stage was a machine learning problem as opposed to a data mining problem.…”
Section: Feature Extraction and Machine Learning (Wrapper Method)mentioning
confidence: 99%
“…is paper aimed to minimize the number of false positives while increasing the number of detected attacks using neural networks. Overall, there is a lot of literature on MANET attacks but very little of it specifically addresses the problem of man-in-the-middle attacks [4,11,15,25,26]. is study aims at remedying this situation.…”
Section: Related Workmentioning
confidence: 99%
“…There is random selection of nodes that always leads to the formation of un-GPSR follows greedy method to forward packets using the one hop neighbors information. Simulation results have shown that efficiency of proposed protocol DD-SHARP has improved[3]. A variant of ALERT has been proposed as S-ALERT [13] that implements suspect detection algorithm to avoid any black hole problem.…”
mentioning
confidence: 99%