Author:
Kumar Adarsh,Aggarwal Alok
Publisher
Springer Berlin Heidelberg
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security in Mobile Ad Hoc Networks: Impact of Attacks and Countermeasure Approaches;Lecture Notes in Networks and Systems;2024
2. Penetration Testing of Smart Meters against Cyber Attacks;2023 IEEE Pune Section International Conference (PuneCon);2023-12-14
3. Characterization of Dual Multiresolution Analysis by Orthogonality of System of Functions: An application to communication engineering;2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT);2022-12-26
4. Advantages of using Containerization Approach for Advanced Version Control System;2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT);2022-12-26
5. ETL, ELT and Reverse ETL: A business case Study;2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE);2022-12-16