Author:
Al Shuhaimi Fatma,Jose Manju,Singh Ajay Vikram
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MACBT Algorithm: Two-Layer Security in WSN;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22
2. The Internet of Things (IoT) Is Revolutionizing Inventory Management;Advances in Information Security, Privacy, and Ethics;2024-02-02
3. A Black Hole Attack Protection Approach in IoT-Based Applications Using RLNC;Contemporary Challenges for Cyber Security and Data Privacy;2023-10-16
4. Identification of DDoS Attack on IoT Network Using SDN;2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN);2023-06
5. Impacts of blockchain in software‐defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future directions;International Journal of Communication Systems;2023-02-06