Cited By
View all- Dhananjaya SM NR S(2024)End to End Model to Reduce the Inference, Jamming, and to Increase the Trust from the Compromised Secondary Nodes in Cognitive Radio Networks2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE59897.2024.10467580(1-10)Online publication date: 24-Jan-2024
- Huang YShu HKang FGuang Y(2021)Protocol reverse-Engineering Methods and Tools: A SurveyComputer Communications10.1016/j.comcom.2021.11.009Online publication date: Nov-2021
- Markosian CTaruvai VMammis A(2020)Neuromodulatory hacking: a review of the technology and security risks of spinal cord stimulationActa Neurochirurgica10.1007/s00701-020-04592-3Online publication date: 3-Oct-2020
- Show More Cited By