Research Output | Dar Al-hikmah Library | IIUM Only
Althoughthe mitigation approaches towards securing the mobile adhoc networks against malicious nodes have been explored widely in recent years but there is a dearth of solutions that can prove effective in addressing the behavior of malicious nodes within a network. As a result, visualizing the malicious nodes effectively through various simulation