Author:
Yoon Seungyong,Kim Jeongnyeo
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure;International Journal of Information Technology;2024-08-28
2. Cloud-Fog Trustworthy Computing for Information Sharing in Dynamic IoT System;2022 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE);2022-12-30
3. Security Threats and Research Challenges of IoT - A Review;2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC);2022-12-07
4. Zero Trust Architecture (ZTA): A Comprehensive Survey;IEEE Access;2022
5. A Secure and Efficient Mutual Authentication Protocol Framework for Unmanned Aerial Vehicles;2021 IEEE Globecom Workshops (GC Wkshps);2021-12