Cited By
View all- Mohammed AFourati LFakhrudeen A(2024)Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110140239:COnline publication date: 1-Feb-2024
- Miao JWang ZWang MFeng XXiao NSun X(2023)Security Authentication Protocol for Massive Machine Type Communication in 5G NetworksWireless Communications & Mobile Computing10.1155/2023/60866862023Online publication date: 1-Jan-2023
- Ferrag MFriha OKantarci BTihanyi NCordeiro LDebbah MHamouda DAl-Hawawreh MChoo K(2023)Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and DefensesIEEE Communications Surveys & Tutorials10.1109/COMST.2023.331724225:4(2654-2713)Online publication date: 1-Oct-2023
- Show More Cited By