Author:
Nagarjun P. M. D.,Kumar V. A.,Kumar C. A.,Ravi A.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Misbehavior Constraint MAC Protocol (MC-MAC) for Wireless Networks;Communications and Networking;2019
2. RC6 Based Data Security and Attack Detection;Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1;2016
3. Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots;2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing;2015-10