Cited By
View all- Kusyk JUyar MSahin C(2018)Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networksEvolutionary Intelligence10.1007/s12065-018-0154-410:3-4(95-117)Online publication date: 18-May-2018
- Mehboob UQadir JAli SVasilakos A(2016)Genetic algorithms in wireless networkingSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-016-2070-920:6(2467-2501)Online publication date: 1-Jun-2016
- Gobel JKrzesinski A(2013)A model of self deployment to maximise area coverage in sensor networks2013 Australasian Telecommunication Networks and Applications Conference (ATNAC)10.1109/ATNAC.2013.6705348(7-12)Online publication date: Nov-2013
- Show More Cited By