[4] PAVASKAR M, KAKADE S, GOND S, et al. Security and intrusion detection in mobile ad hoc network[J]. Journal of Mechanics and MEMS, 2020, 12(1): 27-32.

Search by keywords or author
Journals >Journal of Terahertz Science and Electronic Information Technology >Volume 23 >Issue 2 >Page 175 > Article
- Journal of Terahertz Science and Electronic Information Technology
- Vol. 23, Issue 2, 175 (2025)
References

WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, XU Weijie. Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(2): 175
Download Citation
Set citation alerts for the article
Please enter your email address