(1)
, G. G. N. C. V. S. S. Utilizing the Protected Learning Calculation Method to Forestall the Black Hole Attacks in Mobile Ad-Hoc Networks. IJRITCC 2016, 4, 559-563.