[1]
“Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches”, FJET, vol. 1, no. 2, pp. 746–761, Nov. 2025, doi: 10.33003/jve4wz54.