has been cited by the following article(s):
[1]
|
Proceedings of International Ethical Hacking Conference 2018
Advances in Intelligent Systems and Computing,
2019
DOI:10.1007/978-981-13-1544-2_20
|
|
|
[2]
|
An Accurate Methodology to Identify the Explosives using Wireless Sensor Networks
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3362178
|
|
|
[3]
|
Performance evaluation of Nash Bargaining Power sharing algorithm for integrated cellular phone system
2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON),
2016
DOI:10.1109/UPCON.2016.7894638
|
|
|