Your selections:
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
An optimized hybrid deep intrusion detection model (HD-IDM) for enhancing network security
- Ahmad, Iftikhar, Imran, Muhammad, Qayyum, Abdul, Ramzan, Muhammad, Alassafi, Madini
A novel countermeasure technique for reactive jamming attack in internet of things
- Fadele, Alaba, Othman, Mazliza, Hashem, Ibrahim, Yaqoob, Ibrar, Imran, Muhammad, Shoaib, Muhammad
Securing internet of medical things with friendly-jamming schemes
- Li, Xuran, Dai, Hong-Ning, Wang, Qubeijian, Imran, Muhammad, Li, Dengwang
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-Ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
Are you sure you would like to clear your session, including search history and login status?