1.
DISTRIBUTED INTRUSION DETECTION APPROACH FOR BYZANTINE ATTACK INVOLVING WORM HOLE IN AD HOC NETWORK. IJAERD. 2014;1(11):268-275. Accessed September 8, 2025. https://ijaerd.org/index.php/IJAERD/article/view/352