共 50 条
- [1] A Review of Blackhole Attack in Mobile Adhoc Network [J]. PROCEEDINGS OF 2013 3RD INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME), 2013, : 339 - 344
- [2] A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
- [3] Detection Techniques of Blackhole Attack in Mobile Adhoc Network- A Survey [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
- [4] Detecting And Overcoming Blackhole Attack In Aodv Protocol [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 77 - +
- [5] Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 57 - 67
- [7] Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network [J]. Mobile Networks and Applications, 2019, 24 : 386 - 393
- [8] Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 386 - 393
- [9] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479
- [10] Detecting Colluding Blackhole and Greyhole Attack in Delay Tolerant Networks [J]. 2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 233 - 238