Author:
Amudha G.,Priya P. Prem,Dinesh V.,Akash A.,Akash A.
Reference15 articles.
1. A. H. Dar, B. Habib, F. Khurshid and M. T. Banday, “Experimental analysis of DDoS attack and it is detection in Eucalyptus private cloud platform”, 2016 International Conference on Advances in Computing, Communications, and Informatics (ICACCI), pp. 1718–1724, (2016).
2. A. Hussain Dar, B. Habib, F. Khurshid and M. Tariq Banday, “Experimental analysis of DDoS attack and its detection in Eucalyptus private cloud platform”, 2016 International Conference on Advances in Computing, Communications, and Informatics (ICACCI), pp. 1718–1724, (2016).
3. A. P. Murdan and M. Z. A. Emambocus, “Indoor positioning system simulation for a robot using radio frequency identification”, 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE Conference, pp. 986–991, (2018).
4. Arduino, (2018). Official Available at: https://www.arduino.cc
5. B. Da, P. P. Esnault, S. Hu and C. Wang, “Identity/identifier-enabled networks (IDEAS) for Internet of Things (IoT)”, IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE Conferences, pp. 412–415, (2018).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献