<?xml version="1.0" encoding="UTF-8"?>
<xml><bibliography><APA>Priyanka R และผู้แต่งคนอื่นๆ. (2022) An End-to-End Security Aware WSN Approach with Localization, Authentication, and Data Exchange Security. &lt;i&gt;International Transaction Journal of Engineering, Management, &amp; Applied Sciences &amp; Technologies&lt;/i&gt;, &lt;i&gt;13&lt;/i&gt;(7), 13A7N: 1-14.</APA><Chicago>Priyanka R และผู้แต่งคนอื่นๆ. "An End-to-End Security Aware WSN Approach with Localization, Authentication, and Data Exchange Security". International Transaction Journal of Engineering, Management, &amp; Applied Sciences &amp; Technologies  13 (2022):13A7N: 1-14.</Chicago><MLA>Priyanka R และผู้แต่งคนอื่นๆ. An End-to-End Security Aware WSN Approach with Localization, Authentication, and Data Exchange Security. TuEngr Group:ม.ป.ท. 2022.</MLA></bibliography></xml>
