Subject
Law,General Computer Science
Reference84 articles.
1. Modern authentication schemes in smartphones and iot devices: an empirical survey;Ahvanooey;IEEE Internet Things J.,2021
2. Covertsys: a systematic covert communication approach for providing secure end-to-end conversation via social networks;Ahvanooey;J. Inf. Secur. Appl.,2022
3. Ahp–topsis integration extended with pythagorean fuzzy sets for information security risk analysis;Ak;Complex Intell. Syst.,2019
4. Design a new intelligence expert decision making using game theory and fuzzy ahp to risk management in design, construction, and operation of tunnel projects (case studies: resalat tunnel);Aliahmadi;Int. J. Adv. Manuf. Technol.,2011
5. Android mobile malware detection using fuzzy ahp;Arif;J. Inf. Secur. Appl.,2021
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献