[1]
Hamdan, S., Al-Qassas, R.S. and Tedmori, S. 2015. Comparative Study on Sybil Attack Detection Schemes. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 14, 7 (May 2015), 5869–5876. DOI:https://doi.org/10.24297/ijct.v14i7.1898.