Shan-shan1, C., Geng2, Y., & Sheng-shou2, C. LEACH protocol based security mechanism for Sybil attack detection. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationShan-shan1, CHEN, YANG Geng2, and CHEN Sheng-shou2. LEACH Protocol Based Security Mechanism for Sybil Attack Detection. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationShan-shan1, CHEN, et al. LEACH Protocol Based Security Mechanism for Sybil Attack Detection. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.