Author:
Bale Ajay Sudhir,Saravana Kumar S.,Varun Yogi S.,Vura Swetha,Baby Chithra R.,Vinay N.,Pravesh P.
Reference81 articles.
1. Efficient and secure image communication system based on compressed sensing for IoT monitoring applications;Li;IEEE Trans. Multimedia,2020
2. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing;Beloglazov;Futur. Gener. Comput. Syst.,2012
3. Demo: do not trust your neighbors! A small IoT platform illustrating a man-in-the-middle attack;Navas,2018
4. The evolution of RFID security and privacy: a research survey;Pateriya,2011
5. DDoS in the IoT: Mirai and other botnets;Kolias;Computer,2017
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Error Detection and Correction Techniques using Python: An Exemplar Approach;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
2. Data Transfer Using AMBA Bus: An Empirical Approach;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
3. Traffic Rule Violation Recognition for Two Wheeler using YOLO Algorithm;2023 Second International Conference on Electronics and Renewable Systems (ICEARS);2023-03-02