Found: 5
Select item for more details and to access through your institution.
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 17, p. 3467, doi. 10.3390/electronics13173467
- By:
- Publication type:
- Article
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs).
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3314, doi. 10.3390/electronics13163314
- By:
- Publication type:
- Article
Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 9, p. 1651, doi. 10.3390/electronics13091651
- By:
- Publication type:
- Article
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.
- Published in:
- Wireless Personal Communications, 2022, v. 125, n. 1, p. 513, doi. 10.1007/s11277-022-09562-9
- By:
- Publication type:
- Article
A Student Advising System Using Association Rule Mining.
- Published in:
- International Journal of Web-Based Learning & Teaching Technologies, 2021, v. 16, n. 3, p. 1, doi. 10.4018/IJWLTT.20210501.oa5
- By:
- Publication type:
- Article