Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,378,793 papers from all fields of science
Search
Sign In
Create Free Account
Blackhole exploit kit
The Blackhole exploit kit is as of 2012 the most prevalent web threat, where 29% of all web threats detected by Sophos and 91% by AVG are due to this…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Adobe Flash
Applet
Backdoor (computing)
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks
I. Woungang
,
S. K. Dhurandher
,
M. Obaidat
,
R. D. Peddi
Secur. Commun. Networks
2016
Corpus ID: 41988491
A mobile ad hoc network is a collection of mobiles, autonomous nodes that communicate in a cooperative manner over a wireless…
Expand
2014
2014
BLACKHOLE DETECTION IN MANETS USING ARTIFICIAL NEURAL NETWORKS
Ramanpreet Kaur
,
Anantdeep Kaur
2014
Corpus ID: 14664954
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. A MANET is a collection of communication…
Expand
2014
2014
A novel blackhole attack for multipath AODV and its mitigation
Chaitali Biswas Dutta
,
U. Biswas
International Conference on Recent Advances and…
2014
Corpus ID: 19537504
In wireless network, nodes are not connected by physical links. Routing is an important factor in wireless network. Ad-hoc On…
Expand
2014
2014
A comprehensive analysis of DoS attacks in Mobile Adhoc Networks
Kasturiniva Das
,
Amar Taggu
International Conference on Advances in Computing…
2014
Corpus ID: 16043674
Mobile Adhoc NETworks (MANETs) have gained popularity in both research and industrial domains due to their on-demand ad-hoc…
Expand
Highly Cited
2013
Highly Cited
2013
MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs
R. Jhaveri
International Workshop on Algebraic and…
2013
Corpus ID: 17288279
Role of ad-hoc networks has become vital in ubiquitous computing. Ad-hoc On-demand Distance Vector (AODV) is such a routing…
Expand
2011
2011
BAAP: Blackhole attack avoidance protocol for wireless network
Saurabh Gupta
,
Subrat Kar
,
S. Dharmaraja
International Conference on Computing and…
2011
Corpus ID: 15614800
The lack of centralised infrastructure in adhoc network makes it vulnerable to various attacks. MANET routing disrupts if the…
Expand
2010
2010
Modified AODV Protocol against Blackhole Attacks in MANET
K. Lakshmi
,
S.Manju Priya
,
A.Jeevarathinam
,
K.Rama
,
K. Thilagam
2010
Corpus ID: 63260570
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing…
Expand
2010
2010
"Complete" gravitational waveforms for black-hole binaries with non-precessing spins
P. Ajith
,
M. Hannam
,
+7 authors
Jennifer Seiler
2010
Corpus ID: 40153378
We present the first analytical inspiral-merger-ringdown gravitational waveforms from black-hole (BH) binaries with non…
Expand
2009
2009
A framework for intrusion detection systems by social network analysis methods in ad hoc networks
Wei Wang
,
H. Man
,
Yu Liu
Secur. Commun. Networks
2009
Corpus ID: 1310749
Social network analysis (SNA), originally introduced to provide a mathematical framework for analyzing human interactions and…
Expand
2002
2002
Thermodynamics and/of Horizons: A Comparison of Schwarzschild,RINDLER and desitter Spacetimes
T. Padmanabhan
2002
Corpus ID: 17357789
The notions of temperature, entropy and `evaporation', usually associated with spacetimes with horizons, are analyzed using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE