Cited By
View all- M VA MA PIswarya MSubramanian K(2024)Continuous Monitoring of Web Server Assaults Using Machine Learning2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493548(1-5)Online publication date: 22-Feb-2024
- Noman HAbu-Sharkh O(2023)Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical ImplementationsSensors10.3390/s2313606723:13(6067)Online publication date: 30-Jun-2023
- Purwanto YRuriawan MAlamsyah AWijaya FHusna DKridanto ANugroho FFakhrudin AItqon MFebrianta MWidiyanesti SMentari FGozali ARomadhony A(2023)Security Architecture for Secure Train Control and Monitoring SystemSensors10.3390/s2303134123:3(1341)Online publication date: 25-Jan-2023
- Show More Cited By