Publisher
Springer Science and Business Media LLC
Reference45 articles.
1. Shahraki A, Abbasi M, Piran MJ, Taherkordi A A comprehensive survey on 6G networks:applications, core services, enabling technologies, and future challenges. In: IEEE Trans. Netw. Serv. Manag., vol. XX, p. 1, 2021, Accessed: Nov. 10, 2022. [Online]. http://arxiv.org/abs/2101.12475.
2. Abbas N, Zhang Y, Taherkordi A, Skeie T Mobile edge computing: a survey. IEEE Internet of Things Journal, 5(1). Institute of Electrical and Electronics Engineers Inc., pp. 450–465, Feb. 01, 2018, https://doi.org/10.1109/JIOT.2017.2750180.
3. Abdoli HN, Bidgoly AJ, Fallah S (2022) Intrusion detection system using soft labeling and stacking ensemble. Int J Inf Technol 14(7):3711–3718. https://doi.org/10.1007/S41870-022-01114-5/METRICS
4. Usoh M, Asuquo P, Ozuomba S, Stephen B, Inyang U (2023) A hybrid machine learning model for detecting cybersecurity threats in IoT applications. Int J Inf Technol 15(6):3359–3370. https://doi.org/10.1007/S41870-023-01367-8/METRICS
5. Gomes HM, Read J, Bifet A, Barddal JP, Gama J (2019) Machine learning for streaming data: state of the art, challenges, and opportunities. ACM SIGKDD Explor Newsl 21(2):6–22. https://doi.org/10.1145/3373464.3373470
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献