Author:
Karthik Ragipati,Shukla Parul,Lavanya S.,Naga Satish L. L.,Sai Rohith Krishna J.
Publisher
Springer Nature Singapore
Reference17 articles.
1. Luong, N.C., Hoang, D.T., Wang, P., Niyato, D., Kim, D.I., Han, Z.: Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Commun. Surveys Tuts. 18(4), 2546–2590 (2016)
2. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N.O., Davis Guarnizo, J., Elovici, Y.: ‘Detection of unauthorized IoT devices using machine learning techniques (2017) arXiv:1709.04647. [Online]. Available: http://arxiv.org/abs/1709.04647
3. Nisioti, A., Mylonas, A., Yoo, P.D., Katos, V.: From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods. IEEE Commun. Surveys Tuts. 20(4), 3369–3388 (2018)
4. Jyothi, B., Sruthi, D., Karthik, R.: Energy monitoring using arm 7. Int. J. Innov. Technol. Exploring Eng. (IJITEE) 8(6), 441–445 (2019)
5. Ahmed, M., Ahmed, R., Thakuria, A.J., Laskar, R.H.: Eye center guided constrained local model for landmark localization in facial image. In: 2019 9th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON). IEEE (2019)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献