[1]
“Selected Approach for Hiding the Packets from Jamming Attacks”, IJARCS, vol. 5, no. 2, Jan. 2017, doi: 10.26483/ijarcs.v5i2.2020.