Skip to Main Content
Keywords: Grayhole attack
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Intelligent Computing and Cybernetics (2025) 18 (3): 487–501.
Published: 17 June 2025
... UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node. The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node, after which the packets are selectively tampered with and discarded...

or Create an Account

Close Modal
Close Modal