Cited By
View all- Bhushan BSahoo G(2018)Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4962-098:2(2037-2077)Online publication date: 1-Jan-2018
- Hossain ASreenan CAlberola R(2016)Neighbour-Disjoint Multipath for Low-Power and Lossy NetworksACM Transactions on Sensor Networks10.1145/291479212:3(1-25)Online publication date: 29-Aug-2016
- Doerr BHapp EKlein C(2012)Crossover can provably be useful in evolutionary computationTheoretical Computer Science10.1016/j.tcs.2010.10.035425(17-33)Online publication date: 1-Mar-2012
- Show More Cited By