Return to Article Details Detection of Intrusive Attacks in Mobile Ad-hoc Networks based on ConvNext Model Download Download PDF