Author:
Gallais Antoine,Imine Youcef
Reference41 articles.
1. Deep‐IFS: Intrusion detection approach for IIoT traffic in fog environment;Abdel‐Basset M.;IEEE Transactions on Industrial Informatics,2020
2. Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense
3. Ciphertext‐policy attribute‐based encryption;Bethencourt J.;IEEE Symposium on Security and Privacy (SP’07),2007