Return to Article Details Identification of Malicious Node for Effective Top-k Query Processing in MANETS Download Download PDF