[1]
“DISTRIBUTED INTRUSION DETECTION APPROACH FOR BYZANTINE ATTACK INVOLVING WORM HOLE IN AD HOC NETWORK”, IJAERD, vol. 1, no. 11, pp. 268–275, Nov. 2014, Accessed: Sep. 08, 2025. [Online]. Available: https://ijaerd.org/index.php/IJAERD/article/view/352