0% found this document useful (0 votes)
26 views2 pages

New NETWORKING 23-24

This document lists 40 papers related to networking, MANET/VANET, and intrusion detection. The papers cover topics such as reputation-based routing protocols for MANETs attacked by malicious nodes, cross-layer routing protocols for MANETs, decentralized reputation systems, intelligent driver modeling for VANET communications, high speed MANET performance analysis, blockchain-enabled smart waste management using VANETs, connectivity enhancement in VANETs, and data dissemination strategies for UAV-assisted VANETs. Additional papers focus on network intrusion detection using techniques like deep learning, optimization, traffic analysis, and machine learning for detecting attacks in SDN, IoT, and cloud environments.

Uploaded by

bvkarthik2711
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

New NETWORKING 23-24

This document lists 40 papers related to networking, MANET/VANET, and intrusion detection. The papers cover topics such as reputation-based routing protocols for MANETs attacked by malicious nodes, cross-layer routing protocols for MANETs, decentralized reputation systems, intelligent driver modeling for VANET communications, high speed MANET performance analysis, blockchain-enabled smart waste management using VANETs, connectivity enhancement in VANETs, and data dissemination strategies for UAV-assisted VANETs. Additional papers focus on network intrusion detection using techniques like deep learning, optimization, traffic analysis, and machine learning for detecting attacks in SDN, IoT, and cloud environments.

Uploaded by

bvkarthik2711
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

NETWORKING

NETWORKING-MANET/VANET
CMNW001 Reputation-Based Opportunistic Routing Protocol Using
Q-Learning for MANET Attacked by Malicious Nodes
CMNW002 A Novel Cross-Layer Adaptive Fuzzy-Based Ad Hoc on-
Demand Distance Vector Routing Protocol for MANETs
CMNW003 Generalized Secure and Dynamic Decentralized
Reputation System With a Dishonest Majority
CMNW004 Intelligent Driver Model-Based Vehicular Ad Hoc Network
Communication in Real-Time Using 5G New Radio Wireless
Networks
CMNW005 The Performance Analysis of SPMA Protocol in High
Speed Mobile Ad Hoc Network
CMNW006 Blockchain-Enabled VANET for Smart Solid Waste
Management
CMNW007 Connectivity Enhancement of E-VANET Based on QL-
mRSU Self-Learning Energy-Saving Algorithm
CMNW008 Efficient Data Dissemination Strategy for UAV in UAV-
Assisted VANETs
CMNW009 An Efficient Approach for the Detection and Prevention of
Gray-Hole Attacks in VANETs
INTRUSION DETECTION
CMNW010 NIDS-CNNLSTM: Network Intrusion Detection
Classification Model Based on Deep Learning
CMNW011 Optimization of Intrusion Detection Using Likely Point
PSO and Enhanced LSTM-RNN Hybrid Technique in
communication networks
CMNW012 Android Ransomware Detection From Traffic Analysis
Using Metaheuristic Feature Selection
CMNW013 Cloud-Based Intrusion Detection Approach Using
Machine Learning Techniques
CMNW014 FMDADM: A Multi-Layer DDoS Attack Detection and
Mitigation Framework Using Machine Learning for
Stateful SDN-Based IoT Networks
CMNW015 Detection of Real-Time Malicious Intrusions and Attacks
in IoT Empowered Cybersecurity Infrastructures

CMNW016 An Enhanced AI-Based Network Intrusion Detection System Using


Generative Adversarial Networks
CMNW017 Physical Assessment of an SDN-Based Security Framework for DDoS Attack
Mitigation: Introducing the SDN-SlowRate-DDoS Dataset
CMNW018 Security and Privacy for Low Power IoT Devices on 5G and Beyond
Networks: Challenges and Future Directions
CMNW019 Security Challenges of Selective Forwarding Attack and Design a Secure
ECDH-Based Authentication Protocol to Improve RPL Security
CMNW020 An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for
Cloud-Based Digital Twin Environment
CMNW021 NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based
on Deep Learning
CMNW022 EN-LAKP: Lightweight Authentication and Key Agreement Protocol for
Emerging Networks
CMNW023 How to Attack and Defend NextG Radio Access Network Slicing With
Reinforcement Learning
CMNW024 Security-Aware Provenance for Transparency in IoT Data Propagation
CMNW025 A Novel Detection Approach of Unknown Cyber-Attacks for Intra-Vehicle
Networks Using Recurrence Plots and Neural Networks
CMNW026 Political Security Threat Prediction Framework Using Hybrid Lexicon-Based
Approach and Machine Learning Technique
CMNW027 Deep Learning Based RF Fingerprint Identification with Channel Effects
Mitigation
CMNW028 A Solution Supporting Secure Transmission of Big Data

CMNW029 MCAD: A Machine Learning Based Cyberattacks Detector in Software-


Defined Networking (SDN) for Healthcare Systems
CMNW030 Enhancing Network Slicing Architectures With Machine Learning, Security,
Sustainability and Experimental Networks Integration
CMNW031 High-Rate Secret Key Generation Using Physical Layer Security and Physical
Unclonable Functions
CMNW032 SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and
Jamming
CMNW033 A Blockchain-Based Deep-Learning-Driven
Architecture for Quality Routing in Wireless Sensor Networks
CMNW034 Digital Twin for Safety and Security: Perspectives on Building Lifecycle
CMNW035 RFSE-GRU: Data Balanced Classification Model for Mobile Encrypted
Traffic in Big Data Environment
CMNW036 An LTE Authentication and Key Agreement
Protocol Based on the ECC Self-Certified Public Key
CMNW037 Design of Secure and Lightweight Authentication Scheme for UAV-Enabled
Intelligent Transportation Systems Using Blockchain and PUF
CMNW038 A Novel Front Door Security (FDS) Algorithm Using GoogleNet-BiLSTM
Hybridization
CMNW039 A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for
Industrial Internet of Things
CMNW040 A Robust Security Scheme Based on Enhanced
Symmetric Algorithm for MQTT in the Internet of Things

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy