Sign in

Effective Black Hole Attacks in MANETs.

Raja Azlina Raja MahmoodZurina Mohd HanapiSazlinah HasanAsad I. Khan
Published in: J. Comput. Sci. (2013)
Keyphrases
  • black hole
  • cooperative
  • artificial intelligence
  • reinforcement learning
  • security protocols