Author:
Almaiah Mohammed Amin,Al-Zahrani Ali,Almomani Omar,Alhwaitat Ahmad K.
Publisher
Springer International Publishing
Reference64 articles.
1. Abraham, S., Chengalur-Smith, I.: An overview of social engineering malware: trends, tactics, and implications. Technol. Soc. 32(3), 183–196 (2010)
2. Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 22, 65–88 (2015)
3. Adil, M., Almaiah, M.A., Omar Alsayed, A., Almomani, O.: An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors 20(8), 2311 (2020)
4. Adil, M., Khan, R., Almaiah, M.A., Binsawad, M., Ali, J., Al Saaidah, A., Ta, Q.T.H.: An efficient load balancing scheme of energy gauge nodes to maximize the lifespan of constraint oriented networks. IEEE Access 8, 148510–148527 (2020)
5. Alabady, S.A., Al-Turjman, F., Din, S.: A novel security model for cooperative virtual networks in the IoT era. Int. J. Parallel Prog. 48(2), 280–295 (2020)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献