Cited By
View all- Thiruppathi KJaidhar C(2025)Detection and Mitigation of IoT Based DDoS Attack Using Extended MUD Enabled Device Profiling TechniquesAdvanced Network Technologies and Intelligent Computing10.1007/978-3-031-83783-8_6(99-121)Online publication date: 8-Mar-2025
- Mingo HLawson MWilliamson A(2024)Identifying New Vulnerabilities Embedded in Consumer Internet of Things (IoT) DevicesMultisector Insights in Healthcare, Social Sciences, Society, and Technology10.4018/979-8-3693-3226-9.ch011(186-207)Online publication date: 5-Jan-2024
- Kalinaki KShafik WMasha MAlli A(2024)A Review of Artificial Intelligence Techniques for Improved Cloud and IoT SecurityEmerging Technologies for Securing the Cloud and IoT10.4018/979-8-3693-0766-3.ch002(38-68)Online publication date: 23-Feb-2024
- Show More Cited By