A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation
暂无分享,去创建一个
Surendra Kumar Shukla | Siddharth Pandey | V. Bansal | J. L. Arias-Gonzáles | Devendra Singh | Sunitha Aravind Rathod
[1] K. Kaliyaperumal,et al. Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis , 2022, Security and Communication Networks.
[2] Mohd Naved,et al. Application of cloud computing in banking and e-commerce and related security threats , 2021, Materials Today: Proceedings.
[3] C. Venkatesan,et al. Discrete stationary wavelet transform and SVD-based digital image watermarking for improved security , 2021, Int. J. Comput. Sci. Eng..
[4] Lu Ma,et al. Symmetry Chirp Spread Spectrum Modulation Used in LEO Satellite Internet of Things , 2018, IEEE Communications Letters.
[5] Octavia A. Dobre,et al. Multiobjective Optimization in 5G Hybrid Networks , 2018, IEEE Internet of Things Journal.
[6] Mohsen Guizani,et al. Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[7] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[8] A. Venkatesh,et al. Artificial intelligence based women security and safety measure system , 2022, RECENT TRENDS IN SCIENCE AND ENGINEERING.
[9] P. Kshirsagar,et al. Supervise the data security and performance in cloud using artificial intelligence , 2022, RECENT TRENDS IN SCIENCE AND ENGINEERING.