Author:
Kumar Mohit,Bhushan Bharat
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment;2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN);2023-12-22
2. Container-based Video Streaming Service;2022 IEEE 22nd International Symposium on Computational Intelligence and Informatics and 8th IEEE International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics (CINTI-MACRo);2022-11-21
3. An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems;Design Automation for Embedded Systems;2020-09-07