Sign in

Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks.

Farah I. KandahYashaswi SinghWeiyi ZhangChonggang Wang
Published in: Secur. Commun. Networks (2013)
Keyphrases