Author:
Kumari Pooja,Jain Ankit Kumar
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Selvarajan, S., Srivastava, G., Khadidos, A.O., Khadidos, A.O., Baza, M., Alshehri, A., Lin, J.C.-W.: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comput. 12(38), 1–17 (2023)
2. Al-Fawa’reh, M., Al-Fayoumi, M., Nashwan, S., Fraihat, S.: Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior. Egypt. Inform. J. 23(2), 173–185 (2022)
3. Kasturi, A., Agrawal, A., Hota, C.: Secure peer-to-peer learning using feature embeddings. Clust. Comput. (2023). https://doi.org/10.1007/s10586-023-04155-y
4. Nguyen, K.V., Nguyen, H.T., Le, T.Q., Truong, Q.N.M.: Abnormal network packets identification using header information collected from Honeywall architecture. J. Inf. Telecommun. (2023). https://doi.org/10.1080/24751839.2023.2215135
5. Gueye, T., Wang, Y., Rehman, M., Mushtaq, R.T., Zahoor, S.: A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning. Clust. Comput. 26, 2947–2973 (2023)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献