Cited By
View all- Gupta HNayak A(2024)Publish Subscribe System Security Requirement: A Case Study for V2V CommunicationIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34429215(389-405)Online publication date: 2024
- Prakash VOdedina OKumar AGarg LBawa S(2024)A secure framework for the Internet of Things anomalies using machine learningDiscover Internet of Things10.1007/s43926-024-00088-z4:1Online publication date: 20-Dec-2024
- Siddhartha CAbha CShiwanee BPrageet K(2023)Secure authentication protocol for IoT applications based on blockchain technologyi-manager's Journal on Computer Science10.26634/jcom.11.1.1938011:1(12)Online publication date: 2023
- Show More Cited By