D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey
In this paper, we showed the procedure for solution of routing problem and intrusion detection. Our approach consist Q-routing and verification for authorization in MANET
查看更多