Author:
Balogun Bukola Fatimah,Gbolagade Kazeem Alagbe,Arowolo Micheal Olaolu,Saheed Yakub Kayode
Publisher
Springer International Publishing
Reference66 articles.
1. Aziz, M.N., Ahmad, T.: Cluster analysis-based approach features selection on machine learning for detecting intrusion. Int. J. Intell. Eng. Syst. 12(4), 233–243 (2019). https://doi.org/10.22266/ijies2019.0831.22
2. Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020). https://doi.org/10.1016/j.comnet.2019.107094
3. Alenezi, M.N., Alabdulrazzaq, H., Alshaher, A.A., Alkharang, M.M.: Evolution of malware threats and techniques: a review. Int. J. Commun. Networks Inf. Secur. 12(3), 326–337 (2020)
4. Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020). https://doi.org/10.1016/j.micpro.2020.103201
5. Ogonji, M.M., Okeyo, G., Wafula, J.M.: A survey on privacy and security of Internet of Things. Comput. Sci. Rev. 38, 100312 (2020). https://doi.org/10.1016/j.cosrev.2020.100312
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献