Author:
Feizollah Ali,Anuar Nor Badrul,Salleh Rosli,Amalina Fairuz
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT;Arabian Journal for Science and Engineering;2024-07-10
2. MACBT Algorithm: Two-Layer Security in WSN;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22
3. Designing an AI purchasing requisition bundling generator;Computers in Industry;2024-02
4. Analyzing the Parallel Computing Performance of Unsupervised Machine Learning;2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC);2024-01-08
5. Comprehensive K-Means Clustering;Journal of Computer and Communications;2024