Journal articles on the topic 'Black-hole attack Tree'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 journal articles for your research on the topic 'Black-hole attack Tree.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Moudni, Houda, Mohamed Er-rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.
Full textMoudni, Houda, Mohamed Er-Rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138–49. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.
Full textYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Full textAl Madani, Anhar, Saima Anwar Lashari, Sana Salah Uddin, Abdullah Khan, Muhammad Nouman Atta Muhammad Attaullah, and Dzati Athiar Ramli. "Detecting Black Hole Attack using Support Vector Machine with XGBoosting in Mobile Ad-Hoc Networks." Journal of Informatics and Web Engineering 4, no. 2 (2025): 209–24. https://doi.org/10.33093/jiwe.2025.4.2.13.
Full textRahul Nawkhare, Daljeet Singh, Swati Giadhane, and Saurabh Chakole. "Smart Detection of Routing Attacks in Wireless Sensor Networks Using Ml: Focus On Black Hole Threats." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 05 (2025): 1605–10. https://doi.org/10.47392/irjaem.2025.0259.
Full textBoland, John M., and Deborah L. Woodward. "Thick bark can protect trees from a severe ambrosia beetle attack." PeerJ 9 (February 16, 2021): e10755. http://dx.doi.org/10.7717/peerj.10755.
Full textEskalen, Akif, Richard Stouthamer, Shannon Colleen Lynch, et al. "Host Range of Fusarium Dieback and Its Ambrosia Beetle (Coleoptera: Scolytinae) Vector in Southern California." Plant Disease 97, no. 7 (2013): 938–51. http://dx.doi.org/10.1094/pdis-11-12-1026-re.
Full textLakshmi Narayanan, K., and R. Naresh. "Detection and Prevention of Black Hole Attack using Tree Hierarchical Deep Convolutional Neural Network and Enhanced Identity-based Encryption in Vehicular Ad Hoc Network." IEIE Transactions on Smart Processing & Computing 13, no. 1 (2024): 41–50. http://dx.doi.org/10.5573/ieiespc.2024.13.1.41.
Full textRani, Pooja, Kavita, Sahil Verma, et al. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (2021): 251. http://dx.doi.org/10.3390/s22010251.
Full textLuo, Ke. "A distributed SDN-based intrusion detection system for IoT using optimized forests." PLOS ONE 18, no. 8 (2023): e0290694. http://dx.doi.org/10.1371/journal.pone.0290694.
Full textVolkov, Sabina, and Eduard Gordeev. "Providing Safe Routing in Wireless Self-Organizing Networks." Voprosy kiberbezopasnosti, no. 2(48) (2022): 52–62. http://dx.doi.org/10.21681/2311-3456-2022-2-52-62.
Full textPačenovský, Samuel, and Karol Šotnár. "Notes on the reproduction, breeding biology and ethology of the Eurasian pygmy owl (Glaucidium passerinum) in Slovakia." Slovak Raptor Journal 4, no. 1 (2010): 49–81. http://dx.doi.org/10.2478/v10262-012-0046-y.
Full textAmaouche, Sara, Azidine Guezzaz, Said Benkirane, et al. "FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs." Applied Sciences 13, no. 13 (2023): 7488. http://dx.doi.org/10.3390/app13137488.
Full textBoland, John M. "The impact of an invasive ambrosia beetle on the riparian habitats of the Tijuana River Valley, California." PeerJ 4 (June 21, 2016): e2141. http://dx.doi.org/10.7717/peerj.2141.
Full textHrudevich, Tetiana, and Luidmila Shkira. "HORSE HARNESSES AND RIG OF THE END OF XIX BEG. XX CENTURY IN FUNDS OF NATIONAL HISTORICAL AND ETHNOGRAPHICAL RESERVE «PEREYASLAV» BY I. CHORNYI." Journal of Ukrainian History, no. 40 (2019): 77–82. http://dx.doi.org/10.17721/2522-4611.2019.40.10.
Full textVadhana Kumari, S., S. Anslam Sibi, Shano Maria Selvan, and Kannan Pauliah Nadar. "RTO‐TV: Routed Tree Optimization and Trust‐Value‐Based Security Scheme to Prevent Black Hole Attack in MANET." Journal of Sensors 2024, no. 1 (2024). http://dx.doi.org/10.1155/2024/3363923.
Full text"Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs." International Journal of Recent Technology and Engineering 8, no. 2S11 (2019): 2392–98. http://dx.doi.org/10.35940/ijrte.b1274.0982s1119.
Full textOm, Shree, and Mohammad Talib. "Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks." International Journal of Advanced Computer Science and Applications 2, no. 5 (2011). http://dx.doi.org/10.14569/ijacsa.2011.020501.
Full textHong, Seung-Phil. "Enhancing Black Hole Attack Detection in VANETs: A Hybrid Approach Integrating DBSCAN Clustering with Decision Trees." Scalable Computing: Practice and Experience 25, no. 6 (2024). http://dx.doi.org/10.12694/scpe.v25i6.3270.
Full textFisher, Jeremy A. "Tusk." M/C Journal 13, no. 5 (2010). http://dx.doi.org/10.5204/mcj.279.
Full text