Author:
Rose Thomas,Kifayat Kashif,Abbas Sohail,Asim Muhammad
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference53 articles.
1. A mechanism for securing IoT-enabled applications at the fog layer;Abbas;J. Sens. Actuator Netw.,2019
2. Masquerading attacks detection in mobile Ad Hoc networks;Abbas;IEEE Access,2018
3. S. Abbas, M. Ur Rahman, Simulation-based analysis of MANET routing protocols using group mobility model, in Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016, Vol. 1, 2017, pp. 1–5.
4. COMITMENT: A fog computing trust management approach;Al-khafajiy;J. Parallel Distrib. Comput.,2020
5. Bayesian based intrusion detection system;Altwaijry,2013
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献