Author:
Taware Shrikant,Chakravarthi R. Ravi,Palagan C. Anna,Chandrasekaran Kumaresan,Vadivelan N.
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Akatyev N, James JI (2017) Evidence identification in IoT networks based on threat assessment. Future Gener Comput Syst.
2. Bhattacharjya A, Zhong X, Wang J, Li X (2019) Security challenges and concerns of internet of things (IoT). In: Cyber-physical systems: architecture, security and application. Springer, Cham, pp 153–185
3. Hassan AAAY, Ismail AMEA (2017) Evaluation of encryption algorithms for IOT security (Doctoral dissertation, AlMughtaribeenuniversity).
4. Iglesias-Urkia M, Orive A, Urbieta A et al (2019) Analysis of CoAP implementations for industrial Internet of Things: a survey. J Ambient Intell Human Comput 10:2505–2518. https://doi.org/10.1007/s12652-018-0729-z
5. Kaur J, Kaur PD (2018) CE-GMS: A cloud IoT-enabled grocery management system. Electron Commer Res Appl 28:63–72
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Diverse Aspects and Developmental Directions of IoT and E-commerce: Insights from Topic Modeling;Proceedings of the 2024 11th Multidisciplinary International Social Networks Conference;2024-08-21
2. Simon Chaotic: An enhancement of SIMON block cipher by using Arnold and Henon chaotic maps;2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM);2022-08-31