To see the other types of publications on this topic, follow the link: Black-hole attack Tree.

Journal articles on the topic 'Black-hole attack Tree'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 journal articles for your research on the topic 'Black-hole attack Tree.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Moudni, Houda, Mohamed Er-rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.

Full text
Abstract:
This article explores the application of machine learning (ML) algorithms to classify the black hole attack in mobile ad hoc networks (MANETs). Black hole attacks threaten MANETs by disrupting communication and data transmission. The primary goal of this study is to develop an intrusion detection system (IDS) to detect and classify this attack. The research process involves feature selection, the creation of a custom dataset tailored to the characteristics of black hole attacks, and the evaluation of four machine learning models: random forest (RF), logistic regression (LR), k-nearest neighbor
APA, Harvard, Vancouver, ISO, and other styles
2

Moudni, Houda, Mohamed Er-Rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138–49. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.

Full text
Abstract:
This article explores the application of machine learning (ML) algorithms to classify the black hole attack in mobile ad hoc networks (MANETs). Black hole attacks threaten MANETs by disrupting communication and data transmission. The primary goal of this study is to develop an intrusion detection system (IDS) to detect and classify this attack. The research process involves feature selection, the creation of a custom dataset tailored to the characteristics of black hole attacks, and the evaluation of four machine learning models: random forest (RF), logistic regression (LR), k-nearest neighbor
APA, Harvard, Vancouver, ISO, and other styles
3

Yassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.

Full text
Abstract:
The security issue is essential and more challenging in Mobile Ad-Hoc Network (MANET) due to its characteristics such as, node mobility, self-organizing capability and dynamic topology. MANET is vulnerable to different types of attacks. One of possible attacks is black hole attack. Black hole attack occurs when a malicious node joins the network with the aim of intercepting data packets which are exchanged across the network and dropping them which affects the performance of the network and its connectivity. This paper proposes a new dataset (BDD dataset) for black hole intrusion detection sys
APA, Harvard, Vancouver, ISO, and other styles
4

Al Madani, Anhar, Saima Anwar Lashari, Sana Salah Uddin, Abdullah Khan, Muhammad Nouman Atta Muhammad Attaullah, and Dzati Athiar Ramli. "Detecting Black Hole Attack using Support Vector Machine with XGBoosting in Mobile Ad-Hoc Networks." Journal of Informatics and Web Engineering 4, no. 2 (2025): 209–24. https://doi.org/10.33093/jiwe.2025.4.2.13.

Full text
Abstract:
Mobile Ad-Hoc Networks (MANET) is a type of ad-hoc networks which use less infrastructure, that means the nodes in this network forward the massages without the need of infrastructure such as routers, switches etc. One of the most used attacks that can affect MANET performance is the black hole attack. This attack leads to dropping the packets that means these packets will never arrive and it will decrease the delivery ratio for the packets. This attack is a real problem as the sender is not informed that the data has not reached the intended receiver. The main goal of this study is to propose
APA, Harvard, Vancouver, ISO, and other styles
5

Rahul Nawkhare, Daljeet Singh, Swati Giadhane, and Saurabh Chakole. "Smart Detection of Routing Attacks in Wireless Sensor Networks Using Ml: Focus On Black Hole Threats." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 05 (2025): 1605–10. https://doi.org/10.47392/irjaem.2025.0259.

Full text
Abstract:
As wireless communication networks continue to expand, the need for protection against attacks on the routing of these networks, especially Blackhole attack, has increasingly been recognized as one of the most critical needs of the era. This research involves detecting and classifying Blackhole attacks in wireless sensor networks using different machine learning algorithms. The labeled dataset was then built using normal and Blackhole traffic, and a comparative analysis of four classification models was made: Decision Tree, Random Forest, Logistic Regression and K-Nearest Neighbors. The propos
APA, Harvard, Vancouver, ISO, and other styles
6

Boland, John M., and Deborah L. Woodward. "Thick bark can protect trees from a severe ambrosia beetle attack." PeerJ 9 (February 16, 2021): e10755. http://dx.doi.org/10.7717/peerj.10755.

Full text
Abstract:
Thick bark has been shown to protect trees from wildfires, but can it protect trees from an ambrosia beetle attack? We addressed this question by examining the distribution of holes of the invasive Kuroshio Shot Hole Borer (KSHB, Euwallacea kuroshio; Coleoptera: Scolytinae) in the bark of Goodding’s black willow (Salix gooddingii), one of the KSHB’s most-preferred hosts. The study was conducted in the Tijuana River Valley, California, in 2016–17, during the peak of the KSHB infestation there. Using detailed measurements of bark samples cut from 27 infested trees, we tested and found support fo
APA, Harvard, Vancouver, ISO, and other styles
7

Eskalen, Akif, Richard Stouthamer, Shannon Colleen Lynch, et al. "Host Range of Fusarium Dieback and Its Ambrosia Beetle (Coleoptera: Scolytinae) Vector in Southern California." Plant Disease 97, no. 7 (2013): 938–51. http://dx.doi.org/10.1094/pdis-11-12-1026-re.

Full text
Abstract:
The polyphagous shot hole borer (PSHB) is an invasive ambrosia beetle that forms a symbiosis with a new, as-yet-undescribed Fusarium sp., together causing Fusarium dieback on avocado and other host plants in California and Israel. In California, PSHB was first reported on black locust in 2003 but there were no records of fungal damage until 2012, when a Fusarium sp. was recovered from the tissues of several backyard avocado trees infested with PSHB in Los Angeles County. The aim of this study was to determine the plant host range of the beetle–fungus complex in two heavily infested botanical g
APA, Harvard, Vancouver, ISO, and other styles
8

Lakshmi Narayanan, K., and R. Naresh. "Detection and Prevention of Black Hole Attack using Tree Hierarchical Deep Convolutional Neural Network and Enhanced Identity-based Encryption in Vehicular Ad Hoc Network." IEIE Transactions on Smart Processing & Computing 13, no. 1 (2024): 41–50. http://dx.doi.org/10.5573/ieiespc.2024.13.1.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rani, Pooja, Kavita, Sahil Verma, et al. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (2021): 251. http://dx.doi.org/10.3390/s22010251.

Full text
Abstract:
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered one of the most affecting threats in the MANET in which the attacker node drops the entire data traffic and hence degrades the network performance. Therefore, it necessitates the designing of an algorithm that can protect the network from the BHA node. This article introduces Ad-hoc On-Demand Distance Vector (AODV), a new updated routing protocol that combines the advantages of the Artificial Bee Colony (ABC), Artif
APA, Harvard, Vancouver, ISO, and other styles
10

Luo, Ke. "A distributed SDN-based intrusion detection system for IoT using optimized forests." PLOS ONE 18, no. 8 (2023): e0290694. http://dx.doi.org/10.1371/journal.pone.0290694.

Full text
Abstract:
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt. In this article, a distributed intrusion detection system based on a software defined networking (SDN) is presented. In this method, the network structure is divided into a set of sub-networks using the SDN architecture, and intrusion detection is performed in each sub-network using a controller node. In order to detect intrusion in each sub-network, a decision tree opti
APA, Harvard, Vancouver, ISO, and other styles
11

Volkov, Sabina, and Eduard Gordeev. "Providing Safe Routing in Wireless Self-Organizing Networks." Voprosy kiberbezopasnosti, no. 2(48) (2022): 52–62. http://dx.doi.org/10.21681/2311-3456-2022-2-52-62.

Full text
Abstract:
Purpose of the study: development of a distributed routing algorithm to ensure security in wireless self-organizing networks from intruder attacks on the network. Methods: application of algorithms, graph theory, discrete optimization and heuristic approaches based on the results of numerical experiments. Results: the paper proposes a modified distributed routing algorithm for self-organizing networks. The algorithm, presented in this paper, is based on a distributed version of Dijkstra’s algorithm, designed to detect the shortest paths without loops on a graph under conditions of changing the
APA, Harvard, Vancouver, ISO, and other styles
12

Pačenovský, Samuel, and Karol Šotnár. "Notes on the reproduction, breeding biology and ethology of the Eurasian pygmy owl (Glaucidium passerinum) in Slovakia." Slovak Raptor Journal 4, no. 1 (2010): 49–81. http://dx.doi.org/10.2478/v10262-012-0046-y.

Full text
Abstract:
Notes on the reproduction, breeding biology and ethology of the Eurasian pygmy owl (Glaucidium passerinum) in Slovakia Accessible data on 78 breeding occurrences of the Eurasian pygmy owl (Glaucidium passerinum) in Slovakia are evaluated. Data from the oldest known breeding in 1846 up to 2010 were used. The breeding of this species has been proved in 24 orographic units, at altitudes from 450 (400) to 1450 m. Distribution of the species in Slovakia closely follows the distribution of fir (Abies alba) and spruce (Picea abies) and breeding has also been recorded in forest habitats with an abunda
APA, Harvard, Vancouver, ISO, and other styles
13

Amaouche, Sara, Azidine Guezzaz, Said Benkirane, et al. "FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs." Applied Sciences 13, no. 13 (2023): 7488. http://dx.doi.org/10.3390/app13137488.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety. In VANETs, vehicles are interconnected through a wireless medium, making the network susceptible to various attacks, such as Denial of Service (DoS), Distributed Denial of Service (DDoS), or even black hole attacks that exploit the wireless medium to disrupt the network. These attacks degrade the network performance of VANETs and prevent legiti
APA, Harvard, Vancouver, ISO, and other styles
14

Boland, John M. "The impact of an invasive ambrosia beetle on the riparian habitats of the Tijuana River Valley, California." PeerJ 4 (June 21, 2016): e2141. http://dx.doi.org/10.7717/peerj.2141.

Full text
Abstract:
The Tijuana River Valley is the first natural habitat in California to be substantially invaded by the Kuroshio Shot Hole Borer (KSHB,Euwallaceasp.), an ambrosia beetle native to Southeast Asia. This paper documents the distribution of the KSHB in the riparian vegetation in the valley and assesses the damage done to the vegetation as of early 2016, approximately six months after the beetle was first observed in the valley. I divided the riparian habitats into 29 survey units so that the vegetation within each unit was relatively homogenous in terms of plant species composition, age and density
APA, Harvard, Vancouver, ISO, and other styles
15

Hrudevich, Tetiana, and Luidmila Shkira. "HORSE HARNESSES AND RIG OF THE END OF XIX BEG. XX CENTURY IN FUNDS OF NATIONAL HISTORICAL AND ETHNOGRAPHICAL RESERVE «PEREYASLAV» BY I. CHORNYI." Journal of Ukrainian History, no. 40 (2019): 77–82. http://dx.doi.org/10.17721/2522-4611.2019.40.10.

Full text
Abstract:
The purpose of the study of this article is to highlight the history of the discovery of horse harnesses and rig at the end of the nineteenth and early twentieth centuries, and their characteristics. That objects belonged to Chorniyfamily from Kiev and were transferred in 1979 to create an exposition of museums. Presently, the items of horse harnesses and harnesses from the stock collection NHER «Pereyaslav» are exhibited in the museums «Postal Station», «Museum of the National Land Transport of the Middle Dnieper».These museums are located on the territory of the first Museum of Folk Architec
APA, Harvard, Vancouver, ISO, and other styles
16

Vadhana Kumari, S., S. Anslam Sibi, Shano Maria Selvan, and Kannan Pauliah Nadar. "RTO‐TV: Routed Tree Optimization and Trust‐Value‐Based Security Scheme to Prevent Black Hole Attack in MANET." Journal of Sensors 2024, no. 1 (2024). http://dx.doi.org/10.1155/2024/3363923.

Full text
Abstract:
The security and privacy of personal data have become a significant concern because of the vulnerability of wireless channels and the theft of sensitive information. Several security measures have been implemented in recent years to address this problem. Nevertheless, most protocols currently employed are insufficiently secure for mobile ad hoc networks (MANETs). This study introduces a routed tree optimization and trust value (RTO‐TV) technique to protect data transmission against black hole attacks in MANETs. This technique introduces a modified group optimization approach that enhances ener
APA, Harvard, Vancouver, ISO, and other styles
17

"Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs." International Journal of Recent Technology and Engineering 8, no. 2S11 (2019): 2392–98. http://dx.doi.org/10.35940/ijrte.b1274.0982s1119.

Full text
Abstract:
Mobile adhoc network, a derivative of the adhoc network is sensitive to heterogeneous forms of attacks in particular passive and active attacks. Black hole attack is one such continually prevailing threat in mobile adhoc networks (MANETs), where specific nodes operate spitefully in the course of data transmission. Throughout this work, we intend to present an effectual approach to detect and intercept this attack taking into account Dynamic MANET on-demand (DYMO) routing protocol. This work presupposes working in three modulesplanting, detection and ultimately the interception against the blac
APA, Harvard, Vancouver, ISO, and other styles
18

Om, Shree, and Mohammad Talib. "Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks." International Journal of Advanced Computer Science and Applications 2, no. 5 (2011). http://dx.doi.org/10.14569/ijacsa.2011.020501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hong, Seung-Phil. "Enhancing Black Hole Attack Detection in VANETs: A Hybrid Approach Integrating DBSCAN Clustering with Decision Trees." Scalable Computing: Practice and Experience 25, no. 6 (2024). http://dx.doi.org/10.12694/scpe.v25i6.3270.

Full text
Abstract:
Ensuring the security of communication is crucial in Vehicular Ad Hoc Networks (VANETs) to protect the integrity of information sharing among cars. To implement VANET communication as an answer for the different uses, secure communication is necessary. The unreliability of VANET environments is caused by message delays or tampering in VANET applications. Finding the sweet spot between VANET security and performance and dependability is the primary goal. This project’s overarching goal is to fortify VANETs against Blackhole Routing Attacks and, by identifying and blocking harmful nodes, to miti
APA, Harvard, Vancouver, ISO, and other styles
20

Fisher, Jeremy A. "Tusk." M/C Journal 13, no. 5 (2010). http://dx.doi.org/10.5204/mcj.279.

Full text
Abstract:
My father killed the boar when he was 16. He’d dreamed of killing the boar for some time. My father’s brother had killed a boar when he was only fifteen. My father’s brother was five years older than him. Like most big brothers, he treated his little brother with intolerant contempt. He’d been saying for months that my father would never kill a boar. He was too weak. He was a girl. He was useless. And, just the day before, he told him he was so worthless he better finish the fence on the bottom paddock before dusk or he could expect a kicking. The family farm was gradually being cleared from t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!