Publisher
Springer Nature Singapore
Reference17 articles.
1. Kumar DV (2020) Anomaly detection in temperature sensor data using LSTM RNN model. From analytics India Magzine: https://analyticsindiamag.com/anomaly-detection-in-temperature-sensor-data-using-lstm-rnn-model/. Accessed 24 Sep 2020
2. Vishal TS (2019) An efficient quantum key management scheme. In: 4th international conference on internet of things and connected technologies (ICIoTCT), pp 269–277
3. Sonia Gupta PK (2011) Fuzzy logic based routing algorithm for mobile ad hoc networks. Commun Comput Inf Sci 169:574–579
4. Choudhary V, Taruna DS, Purbey LB (2018) A comparative analysis of cryptographic keys and security. In: 3rd international conference and workshops on recent advances and innovations in engineering (ICRAIE), pp 1–8
5. Fei Hu JZ (2004) Secure wireless sensor networks: problems and solutions, systemics, cybernetics and informatics 1(4):90–100