Hindawi, Security and Communication Networks, 6(9), p. 455-456, 2016
DOI: 10.1002/sec.1468
Export citation
Search in Google Scholar
Full text: Download