Black hole search in dynamic rings
GA Di Luna, P Flocchini, G Prencipe… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
In this paper, we start the investigation of distributed computing by mobile agents in
dangerous dynamic networks. The danger is posed by the presence in the network of a …
dangerous dynamic networks. The danger is posed by the presence in the network of a …
Black hole search in computer networks: State-of-the-art, challenges and future directions
As the size and use of networks continue to increase, network anomalies and faults are
commonplace. Consequently, effective detection of such network issues is crucial for the …
commonplace. Consequently, effective detection of such network issues is crucial for the …
Black hole search in dynamic cactus graph
We study the problem of black hole search by a set of mobile agents, where the underlying
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …
Dangerous graphs
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …
is due to the large scale and dynamic nature of the networks used to process big data and to …
Locating a black hole in a dynamic ring
GA Di Luna, P Flocchini, G Prencipe… - Journal of Parallel and …, 2025 - Elsevier
In networked environments supporting mobile agents, a pressing problem is the presence of
network sites harmful for the agents. In this paper we consider the danger posed by a node …
network sites harmful for the agents. In this paper we consider the danger posed by a node …
Black Hole Search in Dynamic Rings: The Scattered Case
GA Di Luna, P Flocchini, G Prencipe… - … on Principles of …, 2023 - iris.uniroma1.it
In this paper we investigate the problem of searching for a black hole in a dynamic graph by
a set of scattered agents (ie, the agents start from arbitrary locations of the graph). The black …
a set of scattered agents (ie, the agents start from arbitrary locations of the graph). The black …
Asynchronous Gathering in a Dangerous Ring
S Dobrev, P Flocchini, G Prencipe, N Santoro - Algorithms, 2023 - mdpi.com
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
[HTML][HTML] Explore and repair graphs with black holes using mobile entities
In this paper, we study the problem of mobile entities that synchronously have to explore and
repair a graph with faulty nodes, usually called black-holes, that destroy any entering entity …
repair a graph with faulty nodes, usually called black-holes, that destroy any entering entity …
Exploring and making safe dangerous networks using mobile entities
We consider synchronous and mobile entities that have to explore and make safe a network
with faulty nodes, called black-holes, that destroy any entering entity. We are interested in …
with faulty nodes, called black-holes, that destroy any entering entity. We are interested in …
[PDF][PDF] Identifying hostile nodes in networks using mobile agents
E Markou - Bulletin of EATCS, 2013 - eatcs.org
In distributed mobile computing environments one of the most pressing concerns is security.
Two are the most important security threats: a malicious mobile process which can move …
Two are the most important security threats: a malicious mobile process which can move …