1.
DISTRIBUTED INTRUSION DETECTION APPROACH FOR BYZANTINE ATTACK INVOLVING WORM HOLE IN AD HOC NETWORK. IJAERD [Internet]. 2014 Nov. 25 [cited 2025 Sep. 8];1(11):268-75. Available from: https://ijaerd.org/index.php/IJAERD/article/view/352