Cited By
View all- Soni VBhatt DYadav N(2024)Bio Inspired Methods for Intrusion Detection in Internet of Things: A Survey2024 IEEE Region 10 Symposium (TENSYMP)10.1109/TENSYMP61132.2024.10752276(1-8)Online publication date: 27-Sep-2024
- Kumbhakar DAdhikari SKarforma S(2024)CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain managementMultimedia Tools and Applications10.1007/s11042-024-19443-xOnline publication date: 31-May-2024
- Kumar MPai AAgarwal JChrista SPrasad GSaifi S(2023)Deep Learning Model to Defend against Covert Channel Attacks in the SDN Networks2023 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA)10.1109/ACCTHPA57160.2023.10083336(1-5)Online publication date: 20-Jan-2023
- Show More Cited By