Utilizing behaviour history to fight malicious nodes in wireless Ad-hoc networks

  • Houssein Hallani
  • , Seyed A. Shahrestani

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

5 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Utilizing behaviour history to fight malicious nodes in wireless Ad-hoc networks'. Together they form a unique fingerprint.
Sort by

Computer Science