Reference50 articles.
1. Ravi Sharma, Balazs Villanyi, “Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0”, Internet of Things and Cyber-Physical Systems, Elsevier, Sep 2022, Volume 2, Pages 170-179.
2. The Cyber Security via Determinism”, Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT);Szymanski;IEEE Access,2022
3. An ensemble deep learning model for cyber threat hunting in industrialinternet of things;Yazdinejad;Digital Commun. Networks, Elsevier,2022
4. An Efficient Deep Learning Framework forIntelligent Energy Management in IoT Networks;Han;IEEE Internet Things J.,2021
5. Federated Deep Learning for Cyber Security inthe Internet of Things: Concepts, Applications, and Experimental Analysis;Ferrag;IEEE Access,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing Mobile Video Streaming through AMES-Cloud: A Cloud Computing Approach to Addressing Wireless Link Challenges;2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies;2024-03-22
2. Streamlined Deployment and Monitoring of Cloud-Native Applications on AWS with Kubernetes Prometheus Grafana;2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT);2023-11-23