Your selections:
Implicit feedback-based group recommender system for internet of things applications
- Guo, Zhiwei, Yu, Keping, Guo, Tan, Bashir, Ali, Imran, Muhammad, Guizani, Mohsen
Metric learning-based few-shot malicious node detection for IoT backhaul/fronthaul networks
- Zhou, Ke, Lin, Xi, Wu, Jun, Bashir, Ali, Li, Jianhua, Imran, Muhammad
Cloud based secure service providing for IoTs using blockchain
- Rehman, Mubariz, Javaid, Nadeem, Awais, Muhammad, Imran, Muhammad, Naseer, Nidal
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Karmakar, Gour, Petty, Mark, Ahmed, Hassan, Das, Rajkumar, Kamruzzaman, Joarder
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Cyber attacks in mechatronics systems based on Internet of Things
- Wadud, Md Anwar, Amir-Ul-Haque Bhuiyan, T., Uddin, Md Ashraf, Rahman, Md Motiur
Cybersecurity risks in meat processing plant and impacts on total productive maintenance
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Karmakar, Gour, Appuhamillage, Gayan
Security challenges and solutions for 5G HetNet
- Sharma, Aakanksha, Balasubramanian, Venki, Jolfaei, Alireza
Are you sure you would like to clear your session, including search history and login status?