Login / Signup
A Review on Blackhole Attack in Mobile Ad Hoc Networks.
Asma Ahmed Mohammed
Shukor Abd Razak
Abdul Hanan Abdullah
Izzeldin Mohammed
Yahia Abdella
Published in:
ICWN (2010)
Keyphrases
</>
countermeasures
literature review
data mining
databases
attack graphs
real time
web applications