Cited By
View all- Hong Van LThuan LVan Huong PMinh N(2024)A New Method to Improve the CNN Configuration for IoT Attack Detection Problem Based on the Genetic Algorithm and Multi-Objective Approach2024 1st International Conference On Cryptography And Information Security (VCRIS)10.1109/VCRIS63677.2024.10813441(1-9)Online publication date: 3-Dec-2024
- Tieby NKhoury JBou-Harb E(2024)Characterizing and Analyzing LEO Satellite Cyber Landscape: A Starlink Case StudyICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10623029(1352-1357)Online publication date: 9-Jun-2024
- Michael Rajan AMadhan Raaj AJean Justus J(2024)Employing Watchdog Timer to Prohibit DDoS Attack2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT)10.1109/IC2PCT60090.2024.10486314(705-710)Online publication date: 9-Feb-2024
- Show More Cited By