Cited By
View all- Yadav PGaur M(2018)Process Calculi for Intrusion Detection System in Mobile Ad-hoc NetworksJournal of Communications10.12720/jcm.13.11.635-647(635-647)Online publication date: 2018
- Yadav PGaur MGuan S(2018)A behavioural theory for intrusion detection system in mobile ad-hoc networksProceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications10.1145/3195612.3195617(51-60)Online publication date: 15-Mar-2018
- Venkataraman RPushpalatha MRao T(2014)Trust Management and Modeling Techniques in Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch012(278-294)Online publication date: 2014
- Show More Cited By