[HTML][HTML] A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric Computing and …, 2011 - Springer
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, L Der Chou… - Human-centric …, 2011 - researchoutput.ncku.edu.tw
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric Computing and …, 2011 - cir.nii.ac.jp
抄録< jats: title> Abstract</jats: title>< jats: p> The black hole attack is one of the well-known
security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to …

A survey of black hole attacks in wireless mobile ad hoc networks

F Tseng, H Chao - Human-centric Computing and …, 2011 - search.proquest.com
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

[HTML][HTML] A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric …, 2011 - hcis-journal.springeropen.com
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric Computing and …, 2011 - infona.pl
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric Computing and …, 2011 - infona.pl
The black hole attack is one of the well-known security threats in wireless mobile ad hoc
networks. The intruders utilize the loophole to carry out their malicious behaviors because …

[引用][C] A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-centric computing and information …, 2011 - Springer

[引用][C] A survey of black hole attacks in wireless mobile ad hoc networks

FH Tseng, LD Chou, HC Chao - Human-Centric Computing and …, 2011 - Springer