Research Article

An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model

Figure 1

Clone node attack example.