Y. Challal Et Al. , "Internet of Things security and privacy: Design methods and optimization," AD HOC NETWORKS , vol.32, pp.1-2, 2015
Challal, Y. Et Al. 2015. Internet of Things security and privacy: Design methods and optimization. AD HOC NETWORKS , vol.32 , 1-2.
Challal, Y., Natalizio, E., Sen, S., & Vegni, A. M., (2015). Internet of Things security and privacy: Design methods and optimization. AD HOC NETWORKS , vol.32, 1-2.
Challal, Yacine Et Al. "Internet of Things security and privacy: Design methods and optimization," AD HOC NETWORKS , vol.32, 1-2, 2015
Challal, Yacine Et Al. "Internet of Things security and privacy: Design methods and optimization." AD HOC NETWORKS , vol.32, pp.1-2, 2015
Challal, Y. Et Al. (2015) . "Internet of Things security and privacy: Design methods and optimization." AD HOC NETWORKS , vol.32, pp.1-2.
@article{article, author={Yacine Challal Et Al. }, title={Internet of Things security and privacy: Design methods and optimization}, journal={AD HOC NETWORKS}, year=2015, pages={1-2} }