Your selections:
- Pai, Raghuvir, Chattopadhyay, Gopinath, Karmakar, Gour
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
A smart healthcare framework for detection and monitoring of COVID-19 using IoT and cloud computing
- Nasser, Nidal, Emad-ul-Haq, Qazi, Imran, Muhammad, Ali, Asmaa, Razzak, Imran, Al-Helali, Abdulaziz
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Mehedi Hassan, Mohammad, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven, Fortino, Giancarlo
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Are you sure you would like to clear your session, including search history and login status?