Login / Signup
A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks.
Thebiga M
R. Suji Pramila
Published in:
Int. J. Interact. Mob. Technol. (2020)
Keyphrases
</>
black hole
cooperative
mobile applications
security protocols
social networks
mobile devices
mobile phone
mobile users