Publisher
Springer Science and Business Media LLC
Reference37 articles.
1. Adamy D (2001) A first course in electronic warfare. Artech House, Norwood
2. Bany Salameh H, Almajali S, Ayyash M, Elgala H (2017) Security-aware channel assignment in iot-based cognitive radio networks for time-critical applications. In: Fourth International Conference on Software Defined Systems (SDS-2017)
3. Bayraktaroglu E, King C, Liu C, Noubir G, Rajaraman R, Thapa B (2008) On the performance of ieee 802.11 under jamming. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1265–1273
4. Besharati E, Naderan M, Namjoo E (2018) Lr-hids: logistic regression host-based intrusion detection system for cloud environments. J Ambient Intell Human Comput.
https://doi.org/10.1007/s12652-018-1093-8
5. Chen J, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Human Comput.
https://doi.org/10.1007/s12652-018-0887-z
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献