Research Output | Dar Al-hikmah Library | IIUM Only
Inspite of wide range of exploration towards the mitigation techniques for malicious nodes in past few years, the effective solution for addressing the behavioral patterns of malicious nodes are still largely un-found. One of the most challenging dynamics related to this issue is an effective visualization of malicious nodes will never adopt any st