[1]
B. K. P. M. P. P. S. V. W., “Intrusion Detection in Mobile Adhoc Network with Bayesian model based MAC Identification”, IJRITCC, vol. 5, no. 3, pp. 526–530, Mar. 2017.