Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

Farah Kandah, Yashaswi Singh, Weiyi Zhang, Chonggang Wang. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Security and Communication Networks, 6(4):539-547, 2013. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.