Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

Farah Kandah, Yashaswi Singh, Weiyi Zhang, Chonggang Wang. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Security and Communication Networks, 6(4):539-547, 2013. [doi]

Authors

Farah Kandah

This author has not been identified. Look up 'Farah Kandah' in Google

Yashaswi Singh

This author has not been identified. Look up 'Yashaswi Singh' in Google

Weiyi Zhang

This author has not been identified. Look up 'Weiyi Zhang' in Google

Chonggang Wang

This author has not been identified. Look up 'Chonggang Wang' in Google