{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T09:47:24Z","timestamp":1771494444852,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3571306.3571425","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:17:12Z","timestamp":1672762632000},"page":"300-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient swarm based technique for securing MANET transmission"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5152-0821","authenticated-orcid":false,"given":"Bidisha","family":"Banerjee","sequence":"first","affiliation":[{"name":"Jadavpur University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1497-671X","authenticated-orcid":false,"given":"Sarmistha","family":"Neogy","sequence":"additional","affiliation":[{"name":"Jadavpur University, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2020.1733191"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.782657"},{"key":"e_1_3_2_1_3_1","volume-title":"Improved Bacterial Foraging Optimization Algorithm with Comprehensive Swarm Learning Strategies. In International Conference on Swarm Intelligence. Springer, 325\u2013334","author":"Gan Xiaobing","year":"2020","unstructured":"Xiaobing Gan and Baoyu Xiao . 2020 . Improved Bacterial Foraging Optimization Algorithm with Comprehensive Swarm Learning Strategies. In International Conference on Swarm Intelligence. Springer, 325\u2013334 . Xiaobing Gan and Baoyu Xiao. 2020. Improved Bacterial Foraging Optimization Algorithm with Comprehensive Swarm Learning Strategies. In International Conference on Swarm Intelligence. Springer, 325\u2013334."},{"key":"e_1_3_2_1_4_1","first-page":"310","article-title":"A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment","volume":"9","author":"Hassan Mustafa\u00a0Hamid","year":"2020","unstructured":"Mustafa\u00a0Hamid Hassan , Mohammed\u00a0Ahmed Jubair , Salama\u00a0 A Mostafa , Hazalila Kamaludin , Aida Mustapha , Mohd Farhan\u00a0Md Fudzee , and Hairulnizam Mahdin . 2020 . A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment . IAES International Journal of Artificial Intelligence 9 , 2(2020), 310 . Mustafa\u00a0Hamid Hassan, Mohammed\u00a0Ahmed Jubair, Salama\u00a0A Mostafa, Hazalila Kamaludin, Aida Mustapha, Mohd Farhan\u00a0Md Fudzee, and Hairulnizam Mahdin. 2020. A general framework of genetic multi-agent routing protocol for improving the performance of MANET environment. IAES International Journal of Artificial Intelligence 9, 2(2020), 310.","journal-title":"IAES International Journal of Artificial Intelligence"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1485-2"},{"key":"e_1_3_2_1_6_1","article-title":"Investigating open issues in swarm intelligence for mitigating security threats in MANET","volume":"5","author":"Krishnappa Pradeep\u00a0Kumar","year":"2015","unstructured":"Pradeep\u00a0Kumar Krishnappa and B R\u00a0Prasad Babu . 2015 . Investigating open issues in swarm intelligence for mitigating security threats in MANET . International Journal of Electrical and Computer Engineering 5 , 5(2015). Pradeep\u00a0Kumar Krishnappa and BR\u00a0Prasad Babu. 2015. Investigating open issues in swarm intelligence for mitigating security threats in MANET. International Journal of Electrical and Computer Engineering 5, 5(2015).","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074912"},{"key":"e_1_3_2_1_8_1","unstructured":"A\u00a0Christy\u00a0Jeba Malar M Kowsigan N Krishnamoorthy S Karthick E Prabhu and K Venkatachalam. 2020. Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing (2020) 1\u201311.  A\u00a0Christy\u00a0Jeba Malar M Kowsigan N Krishnamoorthy S Karthick E Prabhu and K Venkatachalam. 2020. Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing (2020) 1\u201311."},{"key":"e_1_3_2_1_9_1","volume-title":"Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika: \u010dasopis za automatiku, mjerenje, elektroniku, ra\u010dunarstvo i komunikacije 60, 3","author":"Manoranjini J","year":"2019","unstructured":"J Manoranjini , A Chandrasekar , and S Jothi . 2019. Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika: \u010dasopis za automatiku, mjerenje, elektroniku, ra\u010dunarstvo i komunikacije 60, 3 ( 2019 ), 274\u2013284. J Manoranjini, A Chandrasekar, and S Jothi. 2019. Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika: \u010dasopis za automatiku, mjerenje, elektroniku, ra\u010dunarstvo i komunikacije 60, 3 (2019), 274\u2013284."},{"key":"e_1_3_2_1_10_1","volume-title":"An adaptive Cuckoo search algorithm for optimisation. Applied computing and informatics 14, 2","author":"Mareli M","year":"2018","unstructured":"M Mareli and B Twala . 2018. An adaptive Cuckoo search algorithm for optimisation. Applied computing and informatics 14, 2 ( 2018 ), 107\u2013115. M Mareli and B Twala. 2018. An adaptive Cuckoo search algorithm for optimisation. Applied computing and informatics 14, 2 (2018), 107\u2013115."},{"key":"e_1_3_2_1_11_1","first-page":"2020","article-title":"Comparison of ACO and PSO algorithm using energy consumption and load balancing in emerging MANET and VANET infrastructure","volume":"7","author":"Murugan S","year":"2020","unstructured":"S Murugan , S Jeyalaksshmi , B Mahalakshmi , G Suseendran , T\u00a0Nusrat Jabeen , and R Manikandan . 2020 . Comparison of ACO and PSO algorithm using energy consumption and load balancing in emerging MANET and VANET infrastructure . Journal of Critical Reviews 7 , 9 (2020), 2020 . S Murugan, S Jeyalaksshmi, B Mahalakshmi, G Suseendran, T\u00a0Nusrat Jabeen, and R Manikandan. 2020. Comparison of ACO and PSO algorithm using energy consumption and load balancing in emerging MANET and VANET infrastructure. Journal of Critical Reviews 7, 9 (2020), 2020.","journal-title":"Journal of Critical Reviews"},{"key":"e_1_3_2_1_12_1","first-page":"81","article-title":"Intelligent routing techniques for mobile ad hoc networks using swarm intelligence","volume":"1","author":"Raghavendran CHV","year":"2013","unstructured":"CHV Raghavendran , G\u00a0Naga Satish , and P\u00a0Suresh Varma . 2013 . Intelligent routing techniques for mobile ad hoc networks using swarm intelligence . IJ Intelligent Systems and Applications 1 (2013), 81 \u2013 89 . CHV Raghavendran, G\u00a0Naga Satish, and P\u00a0Suresh Varma. 2013. Intelligent routing techniques for mobile ad hoc networks using swarm intelligence. IJ Intelligent Systems and Applications 1 (2013), 81\u201389.","journal-title":"IJ Intelligent Systems and Applications"},{"key":"e_1_3_2_1_13_1","volume-title":"Multi-path selection based on fractional cuckoo search algorithm for QoS aware routing in MANET. sensor review","author":"Satyananda Reddy","year":"2018","unstructured":"Satyananda Reddy 2018. Multi-path selection based on fractional cuckoo search algorithm for QoS aware routing in MANET. sensor review ( 2018 ). Satyananda Reddy 2018. Multi-path selection based on fractional cuckoo search algorithm for QoS aware routing in MANET. sensor review (2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"Mobile ad hoc network energy cost algorithm based on artificial bee colony. Wireless Communications and Mobile Computing 2017","author":"Tareq Mustafa","year":"2017","unstructured":"Mustafa Tareq , Raed Alsaqour , Maha Abdelhaq , and Mueen Uddin . 2017. Mobile ad hoc network energy cost algorithm based on artificial bee colony. Wireless Communications and Mobile Computing 2017 ( 2017 ). Mustafa Tareq, Raed Alsaqour, Maha Abdelhaq, and Mueen Uddin. 2017. Mobile ad hoc network energy cost algorithm based on artificial bee colony. Wireless Communications and Mobile Computing 2017 (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108807"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2020.107635"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Xin-She Yang and Suash Deb. 2009. Cuckoo search via L\u00e9vy flights. In 2009 World congress on nature & biologically inspired computing (NaBIC). Ieee 210\u2013214.  Xin-She Yang and Suash Deb. 2009. Cuckoo search via L\u00e9vy flights. In 2009 World congress on nature & biologically inspired computing (NaBIC). Ieee 210\u2013214.","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01955-2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3824"}],"event":{"name":"ICDCN 2023: 24th International Conference on Distributed Computing and Networking","location":"Kharagpur India","acronym":"ICDCN 2023"},"container-title":["Proceedings of the 24th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571306.3571425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:53Z","timestamp":1750183673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":19,"alternative-id":["10.1145\/3571306.3571425","10.1145\/3571306"],"URL":"https:\/\/doi.org\/10.1145\/3571306.3571425","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}