Login / Signup

Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs.

Takuji TsudaYuka KomaiTakahiro HaraShojiro Nishio
Published in: IEEE Access (2016)
Keyphrases