Wireless ad-hoc networks : employing behaviour history to combat malicious nodes

  • Houssein Hallani
  • , Seyed A. Shahrestani
  • , Beata J. Wysocki
  • , Tadeusz A. Wysocki

Research output: Chapter in Book / Conference PaperConference Paper

Fingerprint

Dive into the research topics of 'Wireless ad-hoc networks : employing behaviour history to combat malicious nodes'. Together they form a unique fingerprint.

Computer Science