Results 21 to 30 of about 633,009 (149)
Low frequency gravitational waves from black hole MACHO binaries [PDF]
The intensity of low frequency gravitational waves from black hole MACHO binaries is studied. First we estimate the gravitational wave background produced by black hole MACHO binaries in the Milky Way halo as well as the cosmological gravitational wave background produced by the extragalactic black hole MACHO binaries. It is found that the cosmological
arxiv +1 more source
Detection of Gray Hole Attack in Software Defined Networks [PDF]
Gray Hole Attack is an advanced transformation of black hole attack. Both of them are a common type of attack in Wireless Sensor Network (WSN). Malicious nodes may constantly or randomly drop packets and therefore reduce the efficiency of the networking ...
Hsieh, Yi-Ting, Ku, Cheng-Yuan
core +1 more source
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to make ...
I. Aad, J. Hubaux, E. Knightly
semanticscholar +1 more source
Impact of Denial of Service Attacks on Ad Hoc Networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to make ...
I. Aad, Jean-Pierre Hubaux, E. Knightly
semanticscholar +1 more source
Cosmic strings and primordial black holes [PDF]
Cosmic strings and primordial black holes (PBHs) commonly and naturally form in many scenarios describing the early universe. Here we show that if both cosmic strings and PBHs are present, their interaction leads to a range of interesting consequences.
arxiv +1 more source
DPRAODV: A Dynamic Learning System Against Blackhole Attack In AODV Based MANET [PDF]
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design.
Raj, Payal N., Swadas, Prashant B.
core
How well can ultracompact bodies imitate black hole ringdowns?
The ongoing observations of merging black holes by the instruments of the fledging gravitational wave astronomy has opened the way for testing the general relativistic Kerr black hole metric and, at the same time, for probing the existence of more ...
Glampedakis, Kostas, Pappas, George
core +1 more source
Stationary scalar and vector clouds around Kerr-Newman black holes
Massive bosons in the vicinity of Kerr-Newman black holes can form pure bound states when their phase angular velocity fulills the synchronisation condition, i.e. at the threshold of superradiance.
Herdeiro, Carlos A. R., Santos, Nuno M.
core +1 more source
Addressing DODAG inconsistency attacks in RPL networks
RPL is a routing protocol for low-power and lossy constrained node networks. A malicious node can manipulate header options used by RPL to track DODAG inconsistencies, thereby causing denial of service attacks, increased control message overhead, and ...
A. Sehgal+4 more
semanticscholar +1 more source
Shapes and Positions of Black Hole Shadows in Accretion Disks and Spin Parameters of Black Holes [PDF]
Can we determine a spin parameter of a black hole by observation of a black hole shadow in an accretion disk? In order to answer this question, we make a qualitative analysis and a quantitative analysis of a shape and a position of a black hole shadow casted by a rotating black hole on an optically thick accretion disk and its dependence on an angular ...
arxiv +1 more source