Author:
Barani Sundaram B.,Pandey Amit,Abiko Aschalew Tirulo,Vijaykumar Janga,Rastogi Umang,Genale Adola Haile,Karthika P.
Reference16 articles.
1. Ithnin, N., Abbasi, M.: Secure hierarchical routing protocols inwireless sensor network; security survey analysis. Int. J. Comput. Commun. Netw. 2, 6–16 (2020)
2. Karthika, P., Vidhya Saraswathi, P.: A survey of content based video copy detection using big data. Int. J. Sci. Res. Sci. Technol. (IJSRST) 3(5), 114–118, May–June (2017). Online ISSN: 2395-602X, Print ISSN: 2395-6011. https://ijsrst.com/ICASCT2519
3. Niu, W., Lei, J., Tong, E., et al.: Context-aware service ranking in wireless sensor networks. J. Netw. Syst. Manage. 22(1), 50–74 (2014)
4. Komar, C., Donmez, M.Y., Ersoy, C.: Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Comput. Commun. 35(10), 1185–1199 (2012)
5. Karthika, P., Vidhya Saraswathi, P.: IoT using machine learning security enhancement in video steganography allocation for Raspberry Pi. J. Ambient Intell. Hum. Comput. (2020). https://doi.org/10.1007/s12652-020-02126-4
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献