Cited By
View all- Gauba ABedi R(2024)To Enhance Cyber Security for IoTAdvanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection10.4018/979-8-3693-9225-6.ch011(271-308)Online publication date: 4-Oct-2024
- Joseph AMathew PCherian M(2024)Enhanced cryptography techniques using inherited process with cyclic crossover operation in big dataInternational Journal of Modeling, Simulation, and Scientific Computing10.1142/S1793962324500375Online publication date: 22-Aug-2024
- Jiang ZZhong XChen FYan SJi F(2024)Directional Antenna-Based Routing Protocol With Low Detection Probability in Airborne NetworksIEEE Sensors Journal10.1109/JSEN.2023.334932524:5(6919-6929)Online publication date: 1-Mar-2024
- Show More Cited By