Login / Signup

Securing Mobile Adhoc Networks from Black-Hole Attacks.

Fahmina TaranumKhaleel Ur Rahman Khan
Published in: FSDM (2021)
Keyphrases
  • black hole
  • cooperative
  • mobile agents
  • mobile phone
  • black hole attack
  • mobile devices
  • mobile users
  • malicious nodes
  • context aware
  • computing environments
  • mobile technologies
  • mobile applications