Cited By
View all- Do CTran NHong CKamhoua CKwiat KBlasch ERen SPissinou NIyengar S(2017)Game Theory for Cyber Security and PrivacyACM Computing Surveys10.1145/305726850:2(1-37)Online publication date: 10-May-2017
- Geetha ASreenath N(2017)Cronbach Alpha Reliability Factor Based Reputation Mechanism for Mitigating Byzantine Attack in MANETsWireless Personal Communications: An International Journal10.1007/s11277-017-4400-396:3(4525-4541)Online publication date: 1-Oct-2017
- Naghizadeh PLiu M(2016)Perceptions and truthIEEE/ACM Transactions on Networking10.1109/TNET.2014.235976724:1(163-176)Online publication date: 1-Feb-2016
- Show More Cited By