Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

Farah Kandah, Yashaswi Singh, Weiyi Zhang, Chonggang Wang. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Security and Communication Networks, 6(4):539-547, 2013. [doi]

Abstract

Abstract is missing.