Author:
Ahmad Ijaz,Liyanage Madhusanka,Ylianttila Mika,Gurtov Andrei
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Challenges of Secure Software Deployment: An Empirical Study;The International Conference on Evaluation and Assessment in Software Engineering 2022;2022-06-13
2. 5th Generation Security Threats and Responses;Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks;2022-06-03
3. A comprehensive review on the users’ identity privacy for 5G networks;IET Communications;2022-03
4. Extended Security in Heterogeneous Distributed SDN Architecture;Lecture Notes in Electrical Engineering;2020-08-14
5. Remotely Triggered Blackhole Routing in SDN for Handling DoS;Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India;2020