Publisher
Springer Science and Business Media LLC
Reference44 articles.
1. Shamshirband, S.; Joloudari, J.H.; Shirkharkolaie, S.K.; Mojrian, S.; Rahmani, F.; Mostafavi, S.; Mansor, Z.: Game theory and evolutionary optimization approaches applied to resource allocation problems in computing environments: a survey. Math. Biosci. Eng. 18(6), 9190–9232 (2021)
2. Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A.: Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues. J. Inf. Secur. Appl. 55, 102582 (2020)
3. Samuel, O.; Omojo, A.; Onuja, A.; Sunday, Y.; Tiwari, P.; Gupta, D.; Hafeez, G.; Yahaya, A.; Fatoba, O.; Shamshirband, S.: Iomt: a Covid-19 healthcare system driven by federated learning and blockchain. IEEE J. Biomed. Health Inf. (2022)
4. Wu, F.; Li, X.; Xu, L.; Vijayakumar, P.; Kumar, N.: A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst. J. 15, 1120–1129 (2020)
5. Althobaiti, O.; Al-Rodhaan, M.; Al-Dhelaan, A.: An efficient biometric authentication protocol for wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(5), 407971 (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献