Retraction

Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET

Citations (27)

27
Total Citations
6
Post-Retraction
(22.2%)
21
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
3 Within 1 year
0 After 2+ years
511 Days since retraction (latest)
Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network
S. Hemalatha, Maddala Janakidevi, Pullela SVVSR Kumar et al. (8 authors)
International Journal of Electronics and Communication Engineering Open Access
Published: Apr 2024
511 days after retraction
Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
J. Suresh, J. Martin Sahayaraj, B. R. Rajakumar et al. (4 authors)
Wireless Networks
Published: Jan 2024
3 citations
392 days after retraction
APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW
RAJI R. O, Akinyemi Moruff OYELAKIN
Journal of Information Technology and Computing Open Access
Published: Dec 2023
2 citations
389 days after retraction
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET
R Reka, R. Karthick, Reshma Ram et al. (4 authors)
Computers & Security
Published: Oct 2023
50 citations
303 days after retraction
Securing biomedical databases based on fuzzy method through blockchain technology
Ramya Thatikonda, Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli et al. (4 authors)
Soft Computing
Published: May 2023
8 citations
171 days after retraction
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET
Nitesh Ghodichor, Raj Thaneeghavl, Dinesh Kumar Sahu et al. (5 authors)
International journal of Computer Networks & Communications Open Access
Published: Mar 2023
5 citations
114 days after retraction
An intelligent IOT sensor coupled precision irrigation model for agriculture
G.S. Prasanna Lakshmi, P.N. Asha, G. Sandhya et al. (6 authors)
Measurement Sensors Open Access
Published: Dec 2022
50 citations
1 days before retraction
An effectual IOT coupled EEG analysing model for continuous patient monitoring
Simran Khiani, M. Mohamed Iqbal, Amol Dhakne et al. (6 authors)
Measurement Sensors
Published: Nov 2022
15 citations
11 days before retraction
High gain couple feed multiband wearable antenna for <scp>5G</scp> and sub‐6 <scp>GHz</scp> communications
Tale Saeidi, Saeid Karamzadeh
International Journal of RF and Microwave Computer-Aided Engineering Open Access
Published: Oct 2022
2 citations
49 days before retraction
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
S. Padmapriya, R. Shankar, R. Thiagarajan et al. (6 authors)
Intelligent Automation & Soft Computing Open Access
Published: Jun 2022
183 days before retraction
Metamaterial-Based Circularly Polarized Wearable Antenna for ISM and 5G Communications
Tale Saeidi, Melih Gokdemir, Saeid Karamzadeh
2022 30th Signal Processing and Communications Applications Conference (SIU)
Published: May 2022
5 citations
205 days before retraction
Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs
S. Jagatheswari, RVS Praveen, J. Chandra Priya
International Journal of Information Technology
Published: Feb 2022
25 citations
302 days before retraction
A High Energy Efficient Approach for Handling Dynamic Network Using AOMDV Routing Protocol
R Thiagarajan, B Gunasundari, S Padmapriya et al. (6 authors)
2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)
Published: Dec 2021
1 citation
354 days before retraction
Pothole Detection Using Arduino and Ultrasonic Sensors
T. S. Arulananth, M. Baskar, K. Thrishma et al. (6 authors)
Lecture notes in networks and systems
Published: Aug 2021
2 citations
491 days before retraction
Physical Features Based Authentication Technique and Key Management for IoT Networks
C. Santhanakrishnan, K. Annapurani, S. Pradeep et al. (5 authors)
Wireless Personal Communications
Published: Jul 2021
7 citations
511 days before retraction
RETRACTED ARTICLE: Smart communication using tri-spectral sign recognition for hearing-impaired people
B. Kanisha, V. Mahalakshmi, M. Baskar et al. (5 authors)
The Journal of Supercomputing
Published: Jul 2021
18 citations
519 days before retraction
Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication
M. Gayathri, C. Malathy
Wireless Personal Communications
Published: Jun 2021
4 citations
524 days before retraction
Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications
T. Rubesh Kumar, M. Moorthi
Wireless Personal Communications
Published: Jun 2021
5 citations
524 days before retraction
An intelligent web service group-based recommendation system for long-term composition
P. Kirubanantham, S. M. Udhaya Sankar, C. Amuthadevi et al. (6 authors)
The Journal of Supercomputing
Published: Jun 2021
20 citations
533 days before retraction
Accomplishment of Reversible Logic Gates in WSN Environment by Patternization
M. Kirankumar, M. Santhi
Wireless Personal Communications
Published: May 2021
566 days before retraction
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
B. Sowmiya, E. Poovammal
Wireless Personal Communications
Published: May 2021
17 citations
567 days before retraction
An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment
J. Jeyasudha, G. Usha
Wireless Personal Communications Open Access
Published: May 2021
9 citations
572 days before retraction
Adversarial Attack by Inducing Drift in Streaming Data
B. Ida Seraphim, E. Poovammal
Wireless Personal Communications
Published: Apr 2021
2 citations
593 days before retraction
People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain
M. Arulprakash, R. Jebakumar
The Journal of Supercomputing
Published: Apr 2021
27 citations
606 days before retraction
BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network
G. Vasukidevi, T. Sethukarasi
Wireless Personal Communications
Published: Apr 2021
13 citations
608 days before retraction
Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution
A. Saranya, R. Naresh
Neural Processing Letters
Published: Mar 2021
23 citations
619 days before retraction
Trust Model for IoT Using Cluster Analysis: A Centralized Approach
S. Feslin Anish Mon, S. Godfrey Winster, R. Ramesh
Wireless Personal Communications
Published: Mar 2021
20 citations
619 days before retraction
Quick Stats
Total Citations: 27
Years Since Retraction: 3.0 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Model for software quality evaluation with hesitant fuzzy u…
Journal of Intelligent & Fuzzy Systems • 57 citations
A consensus approach to multi-granular linguistic MCGDM wit…
Journal of Intelligent & Fuzzy Systems • 24 citations
Independent hesitant fuzzy group decision making methods wi…
Journal of Intelligent & Fuzzy Systems • 7 citations
HGPSO: An efficient scientific workflow scheduling in cloud…
Journal of Intelligent & Fuzzy Systems • 5 citations
A novel hash based feature descriptors for content based im…
Journal of Intelligent & Fuzzy Systems • 4 citations