Author:
Lakshmi Vimitha R Vidhya, ,T Gireesh Kumar
Publisher
Engineering and Technology Publishing
Subject
Electrical and Electronic Engineering
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementing Internet Key Exchange with Image-based Key Exchange through Socket Programming;2024 IEEE 9th International Conference for Convergence in Technology (I2CT);2024-04-05
2. An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks;2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC);2023-09-18
3. A Strategy for Detecting Malicious Spam Emails using various Classifiers;2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA);2022-09-21
4. Trust-based security routing mechanism in mobile social networks;Neural Computing and Applications;2019-03-29
5. Agent-based modeling of the evolution of green product competition based on consumer interaction network;Proceedings of the 2018 International Conference on Information Management & Management Science - IMMS '18;2018