[1]
G. Qasmarrogy and Y. Almashhadani, “Ad Hoc On-demand Distance Vector Inherent Techniques Comparison for Detecting and Eliminating the Black Hole Attack Nodes in Mobile Ad Hoc Network”, cuesj, vol. 4, no. 1, pp. 77-81, Jan. 2020.