Hindawi, Security and Communication Networks, 18(9), p. 6285-6314, 2016
DOI: 10.1002/sec.1688
Export citation
Search in Google Scholar
Full text: Download