Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
Crossref DOI link: https://doi.org/10.1007/s00779-018-1162-1
Published Online: 2018-06-01
Published Print: 2018-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Periyanayagi, S.
Sumathy, V.
Text and Data Mining valid from 2018-06-01
Article History
Received: 8 April 2018
Accepted: 17 May 2018
First Online: 1 June 2018