Academic literature on the topic 'Black-hole attack Tree'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Black-hole attack Tree.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Black-hole attack Tree"
Boland, John M., and Deborah L. Woodward. "Thick bark can protect trees from a severe ambrosia beetle attack." PeerJ 9 (February 16, 2021): e10755. http://dx.doi.org/10.7717/peerj.10755.
Full textEskalen, Akif, Richard Stouthamer, Shannon Colleen Lynch, Paul F. Rugman-Jones, Mathias Twizeyimana, Alex Gonzalez, and Tim Thibault. "Host Range of Fusarium Dieback and Its Ambrosia Beetle (Coleoptera: Scolytinae) Vector in Southern California." Plant Disease 97, no. 7 (July 2013): 938–51. http://dx.doi.org/10.1094/pdis-11-12-1026-re.
Full textRani, Pooja, Kavita, Sahil Verma, Navneet Kaur, Marcin Wozniak, Jana Shafi, and Muhammad Fazal Ijaz. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (December 30, 2021): 251. http://dx.doi.org/10.3390/s22010251.
Full textLuo, Ke. "A distributed SDN-based intrusion detection system for IoT using optimized forests." PLOS ONE 18, no. 8 (August 30, 2023): e0290694. http://dx.doi.org/10.1371/journal.pone.0290694.
Full textVolkov, Sabina, and Eduard Gordeev. "Providing Safe Routing in Wireless Self-Organizing Networks." Voprosy kiberbezopasnosti, no. 2(48) (2022): 52–62. http://dx.doi.org/10.21681/2311-3456-2022-2-52-62.
Full textPačenovský, Samuel, and Karol Šotnár. "Notes on the reproduction, breeding biology and ethology of the Eurasian pygmy owl (Glaucidium passerinum) in Slovakia." Slovak Raptor Journal 4, no. 1 (January 1, 2010): 49–81. http://dx.doi.org/10.2478/v10262-012-0046-y.
Full textAmaouche, Sara, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Sohaib Bin Altaf Khattak, Haleem Farman, and Moustafa M. Nasralla. "FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs." Applied Sciences 13, no. 13 (June 25, 2023): 7488. http://dx.doi.org/10.3390/app13137488.
Full textBoland, John M. "The impact of an invasive ambrosia beetle on the riparian habitats of the Tijuana River Valley, California." PeerJ 4 (June 21, 2016): e2141. http://dx.doi.org/10.7717/peerj.2141.
Full textHrudevich, Tetiana, and Luidmila Shkira. "HORSE HARNESSES AND RIG OF THE END OF XIX BEG. XX CENTURY IN FUNDS OF NATIONAL HISTORICAL AND ETHNOGRAPHICAL RESERVE «PEREYASLAV» BY I. CHORNYI." Journal of Ukrainian History, no. 40 (2019): 77–82. http://dx.doi.org/10.17721/2522-4611.2019.40.10.
Full text"Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 2392–98. http://dx.doi.org/10.35940/ijrte.b1274.0982s1119.
Full textDissertations / Theses on the topic "Black-hole attack Tree"
Sai, Keerthi T. Divya. "Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5315.
Full textConference papers on the topic "Black-hole attack Tree"
Wahane, Gayatri, Ashok M. Kanthe, and Dina Simunic. "Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks." In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2014. http://dx.doi.org/10.1109/mipro.2014.6859791.
Full text