ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks
Advances in Computer and Computational Sciences - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-10-3770-2_31
◽
2017
◽
pp. 333-343
◽
Cited By ~ 3
Author(s):
Isha Dhyani
◽
Neha Goel
◽
Gaurav Sharma
◽
Bhawna Mallick
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control
International Journal on Communications Antenna and Propagation (IRECAP)
◽
10.15866/irecap.v7i3.12259
◽
2017
◽
Vol 7
(3)
◽
pp. 208
Author(s):
Badreddine Cherkaoui
◽
Abderrahim Beni-hssane
◽
Mohammed Erritali
Keyword(s):
Black Hole
◽
Process Control
◽
Ad Hoc Networks
◽
Statistical Process Control
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Black Hole Attack
◽
Statistical Process
◽
Hoc Networks
Start Chat
Download Full-text
Variable control chart for detecting black hole attack in vehicular ad-hoc networks
Journal of Ambient Intelligence and Humanized Computing
◽
10.1007/s12652-020-01825-2
◽
2020
◽
Vol 11
(11)
◽
pp. 5129-5138
Author(s):
Badreddine Cherkaoui
◽
Abderrahim Beni-hssane
◽
Mohammed Erritali
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Control Chart
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Variable Control
◽
Hoc Networks
Start Chat
Download Full-text
Effect of the black-hole attack in Vehicular Ad-Hoc Networks
10.1109/apcc49754.2021.9609947
◽
2021
◽
Author(s):
Mohamed Anis Mastouri
◽
Salem Hasnaoui
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Hoc Networks
Start Chat
Download Full-text
A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks(CR-VANETs)
2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)
◽
10.1109/iccece.2016.8009589
◽
2016
◽
Cited By ~ 4
Author(s):
Saptarshi Mitra
◽
Bappaditya Jana
◽
Jayanta Poray
Keyword(s):
Black Hole
◽
Cognitive Radio
◽
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks
Procedia Computer Science
◽
10.1016/j.procs.2017.08.337
◽
2017
◽
Vol 113
◽
pp. 170-177
◽
Cited By ~ 5
Author(s):
Badreddine Cherkaoui
◽
Abderrahim Beni-Hssane
◽
Mohammed Erritali
Keyword(s):
Quality Control
◽
Black Hole
◽
Ad Hoc Networks
◽
Control Chart
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Quality Control Chart
◽
Hoc Networks
Start Chat
Download Full-text
A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks
Advances in Intelligent Systems and Computing - Europe and MENA Cooperation Advances in Information and Communication Technologies
◽
10.1007/978-3-319-46568-5_49
◽
2016
◽
pp. 481-490
◽
Cited By ~ 3
Author(s):
Badreddine Cherkaoui
◽
Abderrahim Beni-hssane
◽
Mohammed Erritali
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Clustering Algorithm
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Hoc Networks
Start Chat
Download Full-text
Mobile Ad-hoc Networks Security Aspects in Black Hole Attack
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
◽
10.1109/iceca.2018.8474629
◽
2018
◽
Author(s):
Ventrapragada Sree Pooja
◽
Todupunoori Rohit
◽
Nagulapally Manisha Reddy
◽
S Sudeshna
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions
International Journal of Computer Applications
◽
10.5120/ijca2021921672
◽
2021
◽
Vol 183
(29)
◽
pp. 1-7
Author(s):
Noble Arden
◽
Lily Bensah
◽
Baidenger Agyekum
◽
Carlos Ankora
◽
Gerald Tietaa
◽
...
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Detecting black-hole attack in mobile ad hoc networks
5th European Personal Mobile Communications Conference 2003
◽
10.1049/cp:20030303
◽
2003
◽
Cited By ~ 12
Author(s):
Bo Sun
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42
◽
10.1145/986537.986560
◽
2004
◽
Cited By ~ 139
Author(s):
Mohammad Al-Shurman
◽
Seong-Moo Yoo
◽
Seungjin Park
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close