[1]
T. B. K. D., “Minimize the Vampire Attack using WSN on Routing Protocol”, IJRITCC, vol. 3, no. 6, pp. 3635–3638, Jun. 2015.