Author:
Gayathri V. M.,Supraja P.
Publisher
Springer Science and Business Media LLC
Subject
Control and Optimization,Computer Science Applications,Modelling and Simulation,Control and Systems Engineering
Reference31 articles.
1. Ahmed MN et al (2017) F3TM: flooding factor-based trust management framework for secure data transmission in MANETs. J King Saud Univ Comput Inf Sci 29(3):269–280
2. Aluvala S et al (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682
3. Angelov P, Gu X, Kangin D (2017a) Empirical data analytics. Int J Intell Syst 32(12):1261–1284
4. Angelov P, Gu X, Kangin D, Príncipe JC (2017b) Empirical data analysis: a new tool for data analytics. In: 2016 IEEE international conference on systems, man, and cybernetics, 2017
5. Angelov P, Gu X, Príncipe JC (2017c) A generalized methodology for data analysis. IEEE Trans Cybern 48(10):2981–2993