Academic literature on the topic 'Black-hole attack Tree'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Black-hole attack Tree.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Black-hole attack Tree"
Moudni, Houda, Mohamed Er-rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.
Full textMoudni, Houda, Mohamed Er-Rouidi, Mansour Lmkaiti, and Hicham Mouncif. "Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 2 (2025): 2138–49. https://doi.org/10.11591/ijece.v15i2.pp2138-2149.
Full textYassein, Muneer, Yaser Khamayseh, and Mai Abujazoh. "Feature Selection for Black Hole Attacks." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 521–36. https://doi.org/10.3217/jucs-022-04-0521.
Full textAl Madani, Anhar, Saima Anwar Lashari, Sana Salah Uddin, Abdullah Khan, Muhammad Nouman Atta Muhammad Attaullah, and Dzati Athiar Ramli. "Detecting Black Hole Attack using Support Vector Machine with XGBoosting in Mobile Ad-Hoc Networks." Journal of Informatics and Web Engineering 4, no. 2 (2025): 209–24. https://doi.org/10.33093/jiwe.2025.4.2.13.
Full textRahul Nawkhare, Daljeet Singh, Swati Giadhane, and Saurabh Chakole. "Smart Detection of Routing Attacks in Wireless Sensor Networks Using Ml: Focus On Black Hole Threats." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 05 (2025): 1605–10. https://doi.org/10.47392/irjaem.2025.0259.
Full textBoland, John M., and Deborah L. Woodward. "Thick bark can protect trees from a severe ambrosia beetle attack." PeerJ 9 (February 16, 2021): e10755. http://dx.doi.org/10.7717/peerj.10755.
Full textEskalen, Akif, Richard Stouthamer, Shannon Colleen Lynch, et al. "Host Range of Fusarium Dieback and Its Ambrosia Beetle (Coleoptera: Scolytinae) Vector in Southern California." Plant Disease 97, no. 7 (2013): 938–51. http://dx.doi.org/10.1094/pdis-11-12-1026-re.
Full textLakshmi Narayanan, K., and R. Naresh. "Detection and Prevention of Black Hole Attack using Tree Hierarchical Deep Convolutional Neural Network and Enhanced Identity-based Encryption in Vehicular Ad Hoc Network." IEIE Transactions on Smart Processing & Computing 13, no. 1 (2024): 41–50. http://dx.doi.org/10.5573/ieiespc.2024.13.1.41.
Full textRani, Pooja, Kavita, Sahil Verma, et al. "Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks." Sensors 22, no. 1 (2021): 251. http://dx.doi.org/10.3390/s22010251.
Full textLuo, Ke. "A distributed SDN-based intrusion detection system for IoT using optimized forests." PLOS ONE 18, no. 8 (2023): e0290694. http://dx.doi.org/10.1371/journal.pone.0290694.
Full textDissertations / Theses on the topic "Black-hole attack Tree"
Sai, Keerthi T. Divya. "Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5315.
Full textBook chapters on the topic "Black-hole attack Tree"
Rahman, F., and Priti Sharma. "Designing an Intrusion Detection System to Identify Black Hole Attacks in Wireless Ad-hoc Networks using Support Vector Machines, with a comparison to Decision Trees." In Recent Developments in Microbiology, Biotechnology and Pharmaceutical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003618140-52.
Full textConference papers on the topic "Black-hole attack Tree"
Korsapati, Amulya, and T. J. Nagalakshmi. "Design of intrusion detection system to detect black hole attack using principal component analysis in wireless ad-hoc network comparing with decision tree classifier." In THE 12TH ANNUAL INTERNATIONAL CONFERENCE (AIC) 2022: The 12th Annual International Conference on Sciences and Engineering (AIC-SE) 2022. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0186368.
Full textKorsapati, Amulya, and T. J. Nagalakshmi. "Design of intrusion detection system to detect black hole attack using random forest technique in wireless ad hoc network comparing with decision tree algorithm." In THE 12TH ANNUAL INTERNATIONAL CONFERENCE (AIC) 2022: The 12th Annual International Conference on Sciences and Engineering (AIC-SE) 2022. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0186398.
Full textKorsapati, Amulya, and T. J. Nagalakshmi. "Design of intrusion detection system to detect black hole attack using k-means cluster in a wireless ad-hoc network and comparing with decision tree algorithm." In THE 12TH ANNUAL INTERNATIONAL CONFERENCE (AIC) 2022: The 12th Annual International Conference on Sciences and Engineering (AIC-SE) 2022. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0186399.
Full textWahane, Gayatri, Ashok M. Kanthe, and Dina Simunic. "Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks." In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2014. http://dx.doi.org/10.1109/mipro.2014.6859791.
Full text