ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Intrusion detection technique for black hole attack in mobile ad hoc networks
International Journal of Information Privacy Security and Integrity
◽
10.1504/ijipsi.2015.075435
◽
2015
◽
Vol 2
(2)
◽
pp. 81
◽
Cited By ~ 2
Author(s):
Sunil Kumar
◽
Kamlesh Dutta
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Detection Technique
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Mobile Ad-hoc Networks Security Aspects in Black Hole Attack
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
◽
10.1109/iceca.2018.8474629
◽
2018
◽
Author(s):
Ventrapragada Sree Pooja
◽
Todupunoori Rohit
◽
Nagulapally Manisha Reddy
◽
S Sudeshna
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Black Hole Attack in Mobile Ad Hoc Networks: Challenges and Directions
International Journal of Computer Applications
◽
10.5120/ijca2021921672
◽
2021
◽
Vol 183
(29)
◽
pp. 1-7
Author(s):
Noble Arden
◽
Lily Bensah
◽
Baidenger Agyekum
◽
Carlos Ankora
◽
Gerald Tietaa
◽
...
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Detecting black-hole attack in mobile ad hoc networks
5th European Personal Mobile Communications Conference 2003
◽
10.1049/cp:20030303
◽
2003
◽
Cited By ~ 12
Author(s):
Bo Sun
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42
◽
10.1145/986537.986560
◽
2004
◽
Cited By ~ 139
Author(s):
Mohammad Al-Shurman
◽
Seong-Moo Yoo
◽
Seungjin Park
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Bullet-Proof Verification Using Distributed Watchdogs (BPV-DW) to Detect Black Hole Attack in Mobile Ad Hoc Networks
Advances in Grid and Pervasive Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-642-30767-6_27
◽
2012
◽
pp. 312-322
Author(s):
Firoz Ahmed
◽
Seok Hoon Yoon
◽
Hoon Oh
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Proof Verification
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks
Advances in Computing and Information Technology - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-642-31552-7_38
◽
2013
◽
pp. 365-373
◽
Cited By ~ 3
Author(s):
V. Kamatchi
◽
Rajeswari Mukesh
◽
Rajakumar
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks
Recent Advances in Cryptography and Network Security
◽
10.5772/intechopen.73310
◽
2018
◽
Author(s):
Rushdi A. Hamamreh
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
Computer Communications
◽
10.1016/j.comcom.2010.08.007
◽
2011
◽
Vol 34
(1)
◽
pp. 107-117
◽
Cited By ~ 76
Author(s):
Ming-Yang Su
Keyword(s):
Black Hole
◽
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey
IOSR Journal of Computer Engineering
◽
10.9790/0661-16211108112
◽
2014
◽
Vol 16
(2)
◽
pp. 108-112
Author(s):
Kashmeera N. Khachar
◽
◽
Mrs Jayna B.Shah
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Optimised RBIDS: detection and avoidance of black hole attack through NTN communication in mobile ad hoc networks
International Journal of Computer Aided Engineering and Technology
◽
10.1504/ijcaet.2020.10029057
◽
2020
◽
Vol 13
(1/2)
◽
pp. 4
Author(s):
V.M. Gayathri
◽
P. Supraja
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Black Hole Attack
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close