has been cited by the following article(s):
[1]
|
Computer Security
Lecture Notes in Computer Science,
2020
DOI:10.1007/978-3-030-64330-0_16
|
|
|
[2]
|
A design and implementation of polling TDMA with a comparative analysis with time division multiple access for sporting application
Wireless Networks,
2018
DOI:10.1007/s11276-018-1879-9
|
|
|