User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 8
 Downloands 2
Black Hole Attacks in Mobile Ad Hoc Networks
2015
Journal:  
Journal of New Results in Science
Author:  
Abstract:

Mobile ad hoc networks are used on different occasions, especially during crises. In risk and crisis management, communications is considered vital. With regard to their features, mobile ad hoc networks can be very helpful when dealing with a crisis such as flood, earthquake, war, etc. Security is nowadays considered as one of the main concerns in mobile ad hoc networks. And blac khole attack is among the most important threats of mobile ad hoc networks, where the malicious node places itself along the route by deceiving other nodes and then drops data packets. This paper attempted to investigate a number of proposed solutions against blac khole attacks.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Journal of New Results in Science

Journal Type :   Uluslararası

Metrics
Article : 261
Cite : 245
2023 Impact : 0.087
Journal of New Results in Science