1. Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study;Ferrag;J Inf Secur Appl,2020
2. Internet of Things: a survey on the security of IoT frameworks;Ammar;J Inf Secur Appl,2018
3. Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system;Mousavi;J Inf Secur Appl,2021
4. Lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network;Li;IEEE Trans Veh Technol,2022
5. A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing;Sun;Int J Intell Syst,2021