V Pandey - Applied Soft Computing and Embedded System …, 2021 - books.google.com
11.2. 1 Sybil Attack Properties..................................................................... 218 11.2. 2
Compromised Phase......................................................................... 219 11.2. 3 Deployment …