[1]
T. Dheepak and S. Neduncheliyan, “Low Power Distributed MAC Protocol Against Various Kinds Of Attacks By Using Traffic Analysis Methodology”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 3, pp. 1–7, Jun. 2018.