[1]
R. Chaudhari and M. Deshpande, “Comparative analysis of attack detection methods in Delay Tolerant Network”, International Journal of Engineering and Applied Physics, vol. 1, no. 3, pp. 272–277, Sep. 2021.