Author:
Qabulio Mumtaz,Malkani Yasir Arfat,Keerio Ayaz
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authentication in the Internet of Things: A Review;2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC);2024-01-08
2. Leveraging SQL for Effective Data Acquisition in Wireless Sensor Networks: An Empirical Approach;2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS);2023-10-25
3. Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities;IEEE Transactions on Industrial Informatics;2022-07
4. Taxonomy of IoT Vulnerabilities;Cyber Threat Intelligence for the Internet of Things;2020
5. Sensor Networks Attacks Classifications and Mitigation;Annals of Emerging Technologies in Computing;2018-10-01