Author:
Bandekar Ashutosh,Javaid Ahmad Y
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Designing an Authentication Methodology in IoT Using Energy Consumption Patterns;2024 International Conference on Development and Application Systems (DAS);2024-05-23
2. Cyber Attack Classifications Using Supervised Learning Technique;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
3. Using smart grid infrastructure for authentication and data management in Internet of Medical Things;SECURITY AND PRIVACY;2024-02-06
4. Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users;2023 IEEE International Smart Cities Conference (ISC2);2023-09-24
5. Risk Model and Defense Strategy for Operation and Maintenance of Remote Terminal Units in Distribution System;2023 International Conference on Power System Technology (PowerCon);2023-09-21