Your selections:
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
Deep learning and big data technologies for IoT security
- Amanullah, Mohamed, Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Ahmed, Ejaz, Nainar, Abdul, Akim, Nazihah, Imran, Muhammad
- Patwary, Abdullah Al-Noman, Naha, Ranesh Kumar, Garg, Saurabh, Battula, Sudheer, Patwary, Md Anwarul, Aghasian, Erfan, Amin, Muhammad, Mahanti, Aniket, Gong, Mingwei
Are you sure you would like to clear your session, including search history and login status?