{"id":"https://openalex.org/W3186910260","doi":"https://doi.org/10.3233/jifs-202471","title":"Detection of black-hole attacks in MANET using adaboost support vector machine","display_name":"Detection of black-hole attacks in MANET using adaboost support vector machine","publication_year":2021,"publication_date":"2021-07-16","ids":{"openalex":"https://openalex.org/W3186910260","doi":"https://doi.org/10.3233/jifs-202471","mag":"3186910260"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-202471","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-202471","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026801676","display_name":"Noha A. Hikal","orcid":"https://orcid.org/0000-0003-2334-9523"},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Noha A. Hikal","raw_affiliation_strings":["Department of Information Technology, Faculty of Computer and Information Sciences, Mansoura University, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Computer and Information Sciences, Mansoura University, Egypt","institution_ids":["https://openalex.org/I159247623"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084731651","display_name":"Mahmoud Y. Shams","orcid":"https://orcid.org/0000-0003-3021-5902"},"institutions":[{"id":"https://openalex.org/I130309236","display_name":"Kafrelsheikh University","ror":"https://ror.org/04a97mm30","country_code":"EG","type":"education","lineage":["https://openalex.org/I130309236"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mahmoud Y. Shams","raw_affiliation_strings":["Department of Machine Learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelshiekh, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Machine Learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Kafrelshiekh, Egypt","institution_ids":["https://openalex.org/I130309236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033159072","display_name":"Hanaa Salem","orcid":"https://orcid.org/0000-0002-8714-567X"},"institutions":[{"id":"https://openalex.org/I882248123","display_name":"Delta University for Science and Technology","ror":"https://ror.org/0481xaz04","country_code":"EG","type":"education","lineage":["https://openalex.org/I882248123"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hanaa Salem","raw_affiliation_strings":["Faculty of Engineering, Delta University forScience and Technology, Gamasa, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Delta University forScience and Technology, Gamasa, Egypt","institution_ids":["https://openalex.org/I882248123"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020515597","display_name":"Marwa M. Eid","orcid":"https://orcid.org/0000-0002-8557-3566"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marwa M. Eid","raw_affiliation_strings":["Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology (DHIET), Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology (DHIET), Mansoura, Egypt","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026801676"],"corresponding_institution_ids":["https://openalex.org/I159247623"],"apc_list":null,"apc_paid":null,"fwci":1.2225,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.80263932,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"41","issue":"1","first_page":"669","last_page":"682"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7832146286964417},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7201184630393982},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.626423716545105},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6136723160743713},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5342884063720703},{"id":"https://openalex.org/keywords/distance-vector-routing-protocol","display_name":"Distance-vector routing protocol","score":0.5231712460517883},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4838320314884186},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4484265148639679},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4160253703594208},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4116674065589905},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.36411863565444946},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34625476598739624},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.32553794980049133},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.32403653860092163},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3004274070262909},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08814173936843872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7832146286964417},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7201184630393982},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.626423716545105},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6136723160743713},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5342884063720703},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.5231712460517883},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4838320314884186},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4484265148639679},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4160253703594208},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4116674065589905},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.36411863565444946},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34625476598739624},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.32553794980049133},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.32403653860092163},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3004274070262909},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08814173936843872},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-202471","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-202471","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1977178631","https://openalex.org/W1986176519","https://openalex.org/W2022887622","https://openalex.org/W2049475540","https://openalex.org/W2077450748","https://openalex.org/W2149298154","https://openalex.org/W2166350391","https://openalex.org/W2314465744","https://openalex.org/W2335842465","https://openalex.org/W2338380362","https://openalex.org/W2510189390","https://openalex.org/W2626670644","https://openalex.org/W2765741883","https://openalex.org/W2775212671","https://openalex.org/W2785881462","https://openalex.org/W2884802619","https://openalex.org/W2889646756","https://openalex.org/W2892446648","https://openalex.org/W2898295972","https://openalex.org/W2902722940","https://openalex.org/W2923583053","https://openalex.org/W2961094906","https://openalex.org/W3089301520","https://openalex.org/W6739534612"],"related_works":["https://openalex.org/W2385083787","https://openalex.org/W2592414893","https://openalex.org/W2749079590","https://openalex.org/W2293776035","https://openalex.org/W1967980825","https://openalex.org/W2049045921","https://openalex.org/W2107809065","https://openalex.org/W1969392113","https://openalex.org/W2377438927","https://openalex.org/W2163063991"],"abstract_inverted_index":{"Mobile":[0],"Ad":[1,172],"hock":[2],"Networks":[3],"(MANETs)":[4],"are":[5,20,164,194],"currently":[6],"used":[7],"for":[8,137,157,222,229,284],"developing":[9],"the":[10,42,49,69,72,81,87,103,111,147,198,205,212,242,249,252,256,265,289],"privacy":[11],"and":[12,30,126,140,271],"accuracy":[13,250,266],"of":[14,46,51,59,74,86,102,154,197,210,214,244,251,267],"modern":[15],"networks.":[16],"Furthermore,":[17],"MANET":[18,60,119,276],"applications":[19],"fit":[21],"to":[22,99,121,203,247],"be":[23,108],"data-oriented":[24],"systems,":[25],"that":[26,264],"introduce":[27],"a":[28,38,62,75,132,152,189,280],"secure":[29],"more":[31,190],"robust":[32],"data":[33,115],"transmission":[34],"protocol":[35,98,182],"making":[36],"it":[37],"topmost":[39],"priority":[40],"in":[41,48,68,90,144,208,234,275],"design.":[43],"The":[44,236,260],"lack":[45],"infrastructure":[47],"existence":[50],"dynamic":[52],"topology":[53],"as":[54,56,226,228],"well":[55,227],"limited":[57,127],"resources":[58],"is":[61,187,220,239],"major":[63],"challenge":[64],"facing":[65],"those":[66],"interested":[67],"field.":[70],"Further,":[71],"nonexistence":[73],"formerly":[76],"authorized":[77],"trust":[78],"relationship":[79],"within":[80],"connected":[82],"nodes":[83,105,169],"produces":[84],"instability":[85],"detection":[88,135,253],"process":[89,207,254],"MANETs.":[91,145],"Basically,":[92],"by":[93],"adding":[94],"adapted":[95],"LEACH":[96,180],"routing":[97,181,257],"MANET,":[100],"enhancement":[101],"preserved":[104],"vitality":[106],"will":[107],"achieved,":[109],"moreover,":[110],"load":[112],"balancing":[113],"with":[114,124,150,179,279],"loss":[116],"reduction":[117],"provides":[118,292],"ability":[120],"tracks":[122],"along":[123],"shortest":[125],"paths.":[128],"This":[129,217],"paper":[130],"proposes":[131],"newly":[133],"developed":[134],"scheme":[136,148,238,291],"both":[138,269],"active":[139,223,270],"passive":[141,231,272],"black-hole":[142,224,232],"attacks":[143,225,233,274],"Moreover,":[146,288],"deals":[149],"assessing":[151],"group":[153],"selected":[155],"features":[156,163],"each":[158],"node-based":[159],"AdaBoost-SVM":[160],"algorithm.":[161],"These":[162],"collected":[165],"from":[166],"cluster":[167],"members":[168],"based":[170],"on":[171],"hoc":[173],"On-demand":[174],"Multipath":[175],"Distance":[176],"Vector":[177],"(OMDV)":[178],"clustering":[183],"approaches.":[184],"Although":[185],"SVM":[186],"considered":[188],"stable":[191],"classifier,":[192],"there":[193],"great":[195],"influences":[196],"AdaBoost":[199],"weight":[200],"adaption":[201],"algorithm":[202,219],"enhance":[204],"classification":[206],"terms":[209],"strengthening":[211],"weights":[213],"extracted":[215],"features.":[216],"hybrid":[218],"essential":[221],"identifying":[230],"MANET.":[235],"proposed":[237,290],"tested":[240],"against":[241],"effect":[243],"mobility":[245,286],"variation":[246],"determine":[248],"including":[255],"overhead":[258],"protocol.":[259],"experimental":[261],"results":[262],"investigated":[263],"detecting":[268],"black-holes":[273],"reached":[277],"97%":[278],"promising":[281],"time":[282],"complexity":[283],"different":[285],"conditions.":[287],"an":[293,304],"accurate":[294],"decision":[295],"about":[296],"malicious":[297],"vs":[298],"benign":[299],"node":[300],"dropping":[301],"behavior":[302],"using":[303],"adjustable":[305],"threshold":[306],"value.":[307]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
