• Publications
  • Influence
Black Hole Attacks in Mobile Ad Hoc Networks
TLDR
This paper attempted to investigate a number of proposed solutions against blac khole attacks, where the malicious node places itself along the route by deceiving other nodes and then drops data packets.
Barriers to Developing Social Entrepreneurship in NGOs: Application of Grounded Theory in Western Iran
The most appropriate type of entrepreneurship to achieve the goals of non-governmental organisations (NGOs) is social entrepreneurship (SE). However, the NGOs face many barriers in their SE that sh...
Black Hole Attacks Detection by Invalid Ip Addresses in Mobile Ad Hoc Networks
TLDR
This paper has proposed a method which enables to detect the malicious nodes using valid and invalid addresses, without triggering false detection across the network, and is capable of detecting malicious nodes faster compared to similar methods.
Analysis of Preventive Behaviors of Rural Tourism Hosts in the Face of COVID-19 Pandemic: Application of Health Belief Model
The novel coronavirus (COVID-19) is one of the most severe public health crises in recent history. Therefore, in order to prevent the spread of COVID-19 and its negative effects on the health of