20
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack

Pages 2759-2764 | Received 01 Nov 2021, Published online: 20 Dec 2022

References

  • R. S. Rathore, S. Sangwan, K. Adhikari, and R. Kharel, “Modified echo state network enabled dynamic duty cycle for optimal opportu­nistic routing in EH-WSNs,” Electron., vol. 9, no. 1, 2020, doi: 10.3390/electronics9010098.
  • B. Abidi, A. Jilbab, and E. H. Mohamed, “Wireless body area net­works: a comprehensive survey,” J. Med. Eng. Technol., vol. 44, no. 3, pp. 97–107, 2020, doi: 10.1080/03091902.2020.1729882.
  • V. Jayaraman and H. P. Sultana, “Artificial gravitational cuckoo search algorithm along with particle bee optimized associative memory neural network for feature selection in heart disease classification,” J. Ambient Intell. Humaniz. Comput., 2019, doi: 10.1007/s12652-019-01193-6.
  • F. N. Abed and M. E. Manaa, “A proactive secure file approach using a block chain technique,” J. Discret. Math. Sci. Cryptogr., vol. 23, no. 7, pp. 1447–1453, 2020, doi: 10.1080/09720529.2020.1727610.
  • N. Mehibel and M. Hamadouche, “A new enhancement of elliptic curve digital signature algorithm,” J. Discret. Math. Sci. Cryptogr., vol. 23, no. 3, pp. 743–757, 2020, doi: 10.1080/09720529.2019.1615673.
  • Azmi Shawkat Abdulbaqi, Ahmed J. Obaid & Alyaa Hashem Moham­med (2021) ECG signals recruitment to implement a new technique for medical image encryption, Journal of Discrete Mathematical Sciences and Cryptography, 24:6, 1663-1673, DOI: 10.1080/09720529.2021.1884378.
  • Azmi Shawkat Abdulbaqi, Ahmed J. Obaid & Maysaa Hameed Abdulameer (2021) Smartphone-based ECG signals encryption for transmission and analyzing via IoMTs, Journal of Discrete Mathemati­cal Sciences and Cryptography, DOI: 10.1080/09720529.2021.1958996.
  • Gajanand Sharma, Himanshu Sharma, Rajneesh Pareek, Nidhi Gour, Ravi Shanker Sharma & Ashutosh Kumar (2021) Self-healing topol­ogy for DDoS attack identification & discovery protocol in software-defined networks, Journal of Discrete Mathematical Sciences and Cryp­tography, 24:8, 2221-2232, DOI: 10.1080/09720529.2021.2009192.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.