[1]
S. Hamdan, R. S. Al-Qassas, and S. Tedmori, “Comparative Study on Sybil Attack Detection Schemes”, IJCT, vol. 14, no. 7, pp. 5869–5876, May 2015.