نتایج جستجو برای: black hole attack
تعداد نتایج: 253930 فیلتر نتایج به سال:
In this paper, two routing protocols (AODV and DSR) are simulated under regular operation, single and cooperative black hole attack. This work has been performed by simulator to show consequence of black hole attacks in MANET by using various graphs which are used to collect data in term of several metrics. One common method to perform most of researches in the MANET security field is to simula...
Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
Recent measurements by the Chandra satellite have shown that a supermassive black hole of M = 2.6× 10M⊙ is located in the Galactic Center; it seems probable from other observations that this fact is common in the majority of galaxies. On the other hand, GRB explosions are typical phenomena linked to galactic dynamics. In the present paper we discuss the possibility that GRBs are tidal disruptio...
Recent measurements of the Chandra satellite have shown that a supermassive black hole of M = 2.6× 10M⊙ is located in the Galactic Center; it seems probable that, from other observations, this fact is common in the majority of galaxies. On the other hand, GRB explosions are typical phenomenon linked to the galactic dynamics. In the present paper we discuss the possibility that GRBs are tidal di...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید