Cited By
View all- Vasserman EHopper N(2013)Vampire AttacksIEEE Transactions on Mobile Computing10.1109/TMC.2011.27412:2(318-332)Online publication date: 1-Feb-2013
- Tomala T(2011)Fault Reporting in Partially Known Networks and Folk TheoremsOperations Research10.1287/opre.1110.093659:3(754-763)Online publication date: 1-May-2011
- Xiang YXing KCheng WPark ERotenstreich S(2011)Distributed virtual backbone construction in sensor networks with asymmetric linksWireless Communications & Mobile Computing10.1002/wcm.81011:8(1051-1060)Online publication date: 1-Aug-2011
- Show More Cited By