Author:
Toutsop Otily,Harvey Paige,Kornegay Kevin
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Finding Security Gaps and Vulnerabilities in IoT Devices;Advances in Environmental Engineering and Green Technologies;2024-06-14
2. Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security;Advances in Environmental Engineering and Green Technologies;2024-06-14
3. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey;2024 IEEE International Conference on Electro Information Technology (eIT);2024-05-30
4. Mitigate the Man-in-the-Middle attack by the use of Machine Learning Techniques: A Review;2024 Sixth International Conference on Computational Intelligence and Communication Technologies (CCICT);2024-04-19
5. Cybersecurity Challenges and Solutions in IoT-based Precision Farming Systems;2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON);2023-10-12