The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Blackhole with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2009 (15) 2010-2013 (19) 2014-2015 (15) 2016-2017 (19) 2018-2019 (18) 2020-2021 (19) 2022-2023 (19)
Publication types (Num. hits)
article(57) incollection(4) inproceedings(63)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10 occurrences of 10 keywords

Results
Found 124 publication records. Showing 124 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
191Sohraab Soltani, Syed A. Khayam, Hayder Radha Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
108Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson Toward understanding distributed blackhole placement. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms
53Anu Bala, Munish Bansal, Jagpreet Singh Performance Analysis of MANET under Blackhole Attack. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blackhole, MANET, AODV
24Kai Han 0004, Guanhong Pei, Binoy Ravindran, E. Douglas Jensen Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ashok Khanal, Bahman S. Motlagh, Taskin Koçak Improving the Efficiency of Spam Filtering through Cache Architecture. Search on Bibsonomy MASCOTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hitesh Ballani, Paul Francis, Xinyang Zhang A study of prefix hijacking and interception in the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, BGP, interception
24Hoang Lan Nguyen, Uyen Trang Nguyen Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Pierre-Alain Muller, Cédric Dumoulin, Frédéric Fondement, Michel Hassenforder The TopModL Initiative. Search on Bibsonomy UML Satellite Activities The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Luong Thai Ngoc, Doan Hoang BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Naib Rabiaa, Ali Cherif Moussa, Sofiane Boukli Hacene A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Julian L. Webber, Ahmed Arafa, Abolfazl Mehbodniya, Sathishkumar Karupusamy, Bhoomi Shah, Anil Kumar Dahiya 0001, Pratik Kanani An efficient intrusion detection framework for mitigating blackhole and sinkhole attacks in healthcare wireless sensor networks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Gargi Mitra, Pritam Dash, Yingao Elaine Yao, Aastha Mehta, Karthik Pattabiraman ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Abdllkader Esaid, Mary Agoyi Avoid Suspicious Route of Blackhole Nodes in MANET's: Using A Cooperative Trapping. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Mannan Javed, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Muhammad Asim 0001, Muhammad Imran 0001 Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Amalia Amalia, Yushintia Pramitarini, Ridho Hendra Yoga Perdana, Kyusung Shim, Beongku An A Deep-Learning-Based Secure Routing Protocol to Avoid Blackhole Attacks in VANETs. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Amin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoT. Search on Bibsonomy NOMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Anjali A N, Sreelakshmi C. B, Remya Nair T Blackhole Attack Detection in Wireless Sensor Network Using Backpropagation Algorithm. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Afia Anjum, Habeeb Olufowobi Towards Mitigating Blackhole Attack in NDN-Enabled IoT. Search on Bibsonomy ICCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Sourav Roy Chowdhury, Maxim Khlopov An Eccentric Binary Blackhole in Post-Newtonian Theory. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Remya Krishnan P., P. Arun Raj Kumar Detection and Mitigation of Smart Blackhole and Gray Hole Attacks in VANET Using Dynamic Time Warping. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Mandeep Kumar, Jahid Ali Taylor Sailfish Optimizer-Based Deep Stacked Auto Encoder for Blackhole Attack Detection in Wireless Sensor Network. Search on Bibsonomy J. Web Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Rajesh Kumar Dhanaraj, SK Hafizul Islam, Vani Rajasekar A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Search on Bibsonomy Wirel. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ashwini V. Jatti, V. J. K. Kishor Sonti Performance Improvements of Routing Protocol by Blackhole Detection using Trust Based Scheme. Search on Bibsonomy MENACOMM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti ML-based Detection of Rank and Blackhole Attacks in RPL Networks. Search on Bibsonomy CSNDSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Achraf Lachheb, El Mamoun Souidi The Blackhole Attack on Vehicular Network. Search on Bibsonomy WINCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Anshuman Patel, Devesh Jinwala A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Ning Yang 0009, Kang Chen, Minxiao Wang SmartDetour: Defending Blackhole and Content Poisoning Attacks in IoT NDN Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yang Gao, Jun Tao, Yifan Xu 0002, Zuyan Wang, Weice Sun, Guang Cheng 0001 CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Mukul Shukla, Brijendra Kumar Joshi, Upendra Singh Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Mohandas V. Pawar, Anuradha Jagadeesan Detection of blackhole and wormhole attacks in WSN enabled by optimal feature selection using self-adaptive multi-verse optimiser with deep learning. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Prathapchandran Kannimuthu Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments. Search on Bibsonomy Int. J. Interdiscip. Telecommun. Netw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Abiral Acharya, Jared Oluoch A Dual Approach for Preventing Blackhole Attacks in Vehicular Ad Hoc Networks Using Statistical Techniques and Supervised Machine Learning. Search on Bibsonomy EIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Gerardo Mario Marotta, Floriano De Rango Extending OMNeT++ Simulator to Secure Vehicular Communication under Blackhole Attack. Search on Bibsonomy SIMULTECH The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Smritikona Barai, Parama Bhaumik Detection and Mitigation of Blackhole Attack Effect in Opportunistic Networks. Search on Bibsonomy OCIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Kent Sanders, Stephen S. Yau An Effective Approach to Protecting Low-Power and Lossy IoT Networks Against Blackhole Attacks. Search on Bibsonomy iThings/GreenCom/CPSCom/SmartData/Cybermatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22V. R. Rajasekar, S. Rajkumar 0001 Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study. Search on Bibsonomy ICECS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Dhruvi Zala, Dhaval Thummar, B. R. Chandavarkar Mitigating Blackhole attack of Underwater Sensor Networks. Search on Bibsonomy ICCCNT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Nitin Khanna, Monika Sachdeva BEST: Battery, Efficiency and Stability Based Trust Mechanism Using Enhanced AODV for Mitigation of Blackhole Attack and Its Variants in MANETs. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2020 DBLP  BibTeX  RDF
22Thebiga M 0001, R. Suji Pramila Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants. Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Kapil Juneja Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Eric Garcia Ribera, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, Vassilios G. Vassilakis Heartbeat-Based Detection of Blackhole and Greyhole Attacks in RPL Networks. Search on Bibsonomy CSNDSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Jingxuan Lyu, Chenju Chen, Hui Tian 0003 Secure Routing Based on Geographic Location for Resisting Blackhole Attack In Three-dimensional VANETs. Search on Bibsonomy ICCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Takeru Terai, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi Blackhole Attack Cooperative Prevention Method in MANETs. Search on Bibsonomy CANDAR (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Bilal Erman Bilgin, Selçuk Baktir A light-weight solution for blackhole attacks in wireless sensor networks. Search on Bibsonomy Turkish J. Electr. Eng. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Aly Mohamed El-Semary, Hossam Diab BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Nitin Khanna, Monika Sachdeva A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Search on Bibsonomy Comput. Sci. Rev. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Jun Wang, Zhiwei Zhu, Junjie Liu 一种针对无线传感网中黑洞攻击的检测与防御方法 (Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks). Search on Bibsonomy 计算机科学 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22 Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Himanshu B. Patel, Devesh C. Jinwala Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach. Search on Bibsonomy TENCON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Amine Guidara, Saúl E. Pomares Hernández, Lil María Rodríguez-Henríquez, Hatem Hadj Kacem, Ahmed Hadj Kacem A Study of the Forwarding Blackhole phenomenon during Software-Defined Network Updates. Search on Bibsonomy SDS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Zhongmou Li, Hui Xiong 0001 Mining Blackhole and Volcano Patterns for Fraud Detection. Search on Bibsonomy Encyclopedia of Social Network Analysis and Mining. 2nd Ed. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22 Blackhole Pattern. Search on Bibsonomy Encyclopedia of Social Network Analysis and Mining. 2nd Ed. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Ola Malawi, Mohammad S. Obaidat Mitigating the Effect of Blackhole Attack on MANETs Using AODV Protocol Under Transmission Control Protocol. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2018 DBLP  BibTeX  RDF
22Thanh Tu Vo, Thai-Ngoc Luong VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network. Search on Bibsonomy J. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Li Zhang, Xiaohang Wang 0001, Yingtao Jiang, Mei Yang, Terrence S. T. Mak, Amit Kumar Singh 0002 Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Rashmi Sahay, G. Geethakumari, Barsha Mitra, V. Thejas Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT. Search on Bibsonomy ANTS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Jun Jiang, Yuhong Liu, Behnam Dezfouli A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks. Search on Bibsonomy APSIPA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Guoquan Li, Zheng Yan 0002, Yulong Fu A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network. Search on Bibsonomy CNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Oussama Sbai, Mohamed Elboukhari Simulation of MANET's Single and Multiple Blackhole Attack with NS-3. Search on Bibsonomy CIST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev Securing data forwarding against blackhole attacks in mobile ad hoc networks. Search on Bibsonomy CCWC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Mubarak Umar, Abdulrashid Sabo, Auwal A. Tata Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET. Search on Bibsonomy NaNA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Yugarshi Shashwat, Prashant Pandey 0004, K. V. Arya, Smit Kumar A modified AODV protocol for preventing blackhole attack in MANETs. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Search on Bibsonomy Comput. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22R. Thillaikarasi, S. Mary Saira Bhanu An Efficient DSR Protocol to Detect Blackhole Attacks in WMN Using Cross Layer Approach. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Mohammad Wazid, Ashok Kumar Das A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Sana Akourmis, Youssef Fakhri, Moulay Driss Rahmani Reducing Blackhole Effect in WSN. Search on Bibsonomy IBICA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Gurjinder Kaur, V. K. Jain, Yogesh Chaba Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks. Search on Bibsonomy ISDDC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Alessandro Bianchi, Sebastiano Pizzutilo, Gennaro Vessio Intercepting Blackhole Attacks in MANETs: An ASM-based Model. Search on Bibsonomy SEFM Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Raghad Baiad, Omar Alhussein, Hadi Otrok, Sami Muhaidat Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Search on Bibsonomy Veh. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Chaima Bensaid, Sofiane Boukli Hacene, Kamel Mohamed Faraoun Detection and Ignoring of Blackhole Attack in Vanets Networks. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Thi Ngoc Diep Pham, Chai Kiat Yeo Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Preeti Nagrath, Sandhya Aneja, Neelima Gupta, Sanjay Madria Protocols for mitigating blackhole attacks in delay tolerant networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Hyung-Jin Mun, Kun-Hee Han Blackhole attack: user identity and password seize attack using honeypot. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Thomas King, Christoph Dietzel, Job Snijders, Gert Doering, Greg Hankins BLACKHOLE Community. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Rajender Dheeraj Peddi A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Sungsu Lim, Junghoon Kim, Jae-Gil Lee 0001 BlackHole: Robust community detection inspired by graph drawing. Search on Bibsonomy ICDE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22David Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. Search on Bibsonomy ITNAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Rashmi Chaudhary, Prakash Rao Ragiri Implementation and Analysis of Blackhole Attack in AODV Routing Protocol. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Mohamed A. Abdelshafy, Peter J. B. King Resisting blackhole attacks on MANETs. Search on Bibsonomy CCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Dilraj Singh, Amardeep Singh Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks. Search on Bibsonomy Future Internet The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Satria Mandala, Md. Asri Ngadi, Johan Mohamad Sharif, Mohd Soperi Mohd Zahid, Farhan Mohamed Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Adriano Favaro, Eduardo Parente Ribeiro Reducing SDN/openflow control plane overhead with blackhole mechanism. Search on Bibsonomy GIIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Thi Ngoc Diep Pham, Chai Kiat Yeo Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks. Search on Bibsonomy CCNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Zhongmou Li, Hui Xiong 0001 Mining Blackhole and Volcano Patterns for Fraud Detection. Search on Bibsonomy Encyclopedia of Social Network Analysis and Mining The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22 Blackhole Pattern. Search on Bibsonomy Encyclopedia of Social Network Analysis and Mining The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Zurina Mohd Hanapi, Mahamod Ismail Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Adnan Ahmed 0001, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa Performance Analysis of Adhoc on demand Distance Vector Protocol with Blackhole Attack in WSN. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda SFTP : A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
22Seryvuth Tan, Phearin Sok, Keecheon Kim Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. Search on Bibsonomy Int. J. Networked Distributed Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Fei Shi, Weijie Liu 0005, Dongxu Jin, JooSeok Song A cluster-based countermeasure against blackhole attacks in MANETs. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Satria Mandala, Kommineni Jenni, Md. Asri Ngadi, Maznah Kamat, Yahaya Coulibaly Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. Search on Bibsonomy SSCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Raghad Baiad, Hadi Otrok, Sami Muhaidat, Jamal Bentahar Cooperative cross layer detection for blackhole attack in VANET-OLSR. Search on Bibsonomy IWCMC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Yinghui Guo, Sebastian Schildt, Tobias Pögel, Stephan Rottmann, Lars C. Wolf Mitigating Blackhole attacks in a hybrid VDTN. Search on Bibsonomy WoWMoM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Huisheng Gao, Ruping Wu, Mingjing Cao, Can Zhang Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network. Search on Bibsonomy ICA3PP (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Anoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. Search on Bibsonomy J. Supercomput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Srijani Mukherjee, Koustabh Dolui, Soumya Kanti Datta Intelligent management of misbehaving nodes in wireless sensor networks: Using blackhole and selective forwarding node detection algorithm. Search on Bibsonomy IEEE ANTS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 124 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license