[1]
K. KONATE and G. Abdourahime, “Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks”,
Int.J.Adv.CT
, vol. 3, no. 12, pp. 1425–1430, Feb. 2024.