Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks
G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …
infrastructure, high speed in setting up the network, and no need for centralized …
[HTML][HTML] A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a
MANET, it is assumed that all of the nodes cooperate with each other to transfer data …
MANET, it is assumed that all of the nodes cooperate with each other to transfer data …
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
Today, more than ever, the necessity for remote availability, independent of a client's
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …
[PDF][PDF] An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs
Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to
each other over a wireless channel without any centralized infrastructure, nor integrated …
each other over a wireless channel without any centralized infrastructure, nor integrated …
Assessing node trustworthiness through adaptive trust threshold for secure routing in mobile Ad Hoc networks
MVK Reddy, PVS Srinivas… - International Journal of …, 2022 - search.proquest.com
In the field of communication, Mobile Ad-hoc networks (MANET) have become popular and
widely used. However, there are many security challenges in communication through these …
widely used. However, there are many security challenges in communication through these …
A novel trust value based mobile ad hoc networks (MANETs) security
R Sarumathi, V Jayalakshmi - 2023 7th International …, 2023 - ieeexplore.ieee.org
Mobile ad hoc networks, abbreviated as MANETs, are a type of self-configuring network in
which several wireless nodes temporarily set up linkages between each other. Due to the …
which several wireless nodes temporarily set up linkages between each other. Due to the …
DRI table based traffic-behaviour analysis approach for detection of blackhole attack
K Juneja - … Journal of Sensors Wireless Communications and …, 2020 - ingentaconnect.com
Background: The blackhole infection can affect the collaborative communication in mobile
networks. It is man-in-middle attack that seizes and deflects the route and avoids packet …
networks. It is man-in-middle attack that seizes and deflects the route and avoids packet …
Mitigation of black hole attack in MANETs: A sequence no-based approach
L Maheshavel, C Senthilkumar - Journal of Physics: Conference …, 2021 - iopscience.iop.org
MANET (Mobile Ad-hoc network) is type of network which is comprised of moveableness
vertices which are connected to form a wireless network. The connected vertices can move …
vertices which are connected to form a wireless network. The connected vertices can move …
A review on prevention and detection schemes for black hole attacks in MANET
R Chakravorty, J Prakash - 2020 8th International Conference …, 2020 - ieeexplore.ieee.org
Mobile Ad hoc Network (MANET) is one of the emerging technologies to communicate
between nodes and its decentralized structure, self-configuring nature are the few properties …
between nodes and its decentralized structure, self-configuring nature are the few properties …
Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network
K Juneja - Wireless Personal Communications, 2021 - Springer
The existence of a non-cooperative or black hole node as an intermediate node in a mobile
network can degrade the performance of the network and affects the trust of neighbor nodes …
network can degrade the performance of the network and affects the trust of neighbor nodes …