Return to Article Details Utilizing the protected learning calculation method to forestall the Black Hole Attacks in Mobile ad-hoc networks Download Download PDF