Cited By
View all- Krentz KVoigt T(2024)Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMORComputer Communications10.1016/j.comcom.2024.01.024217:C(57-69)Online publication date: 25-Jun-2024
- Thungon LAhmed NDe DHussain M(2024)A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future DirectionsWireless Personal Communications10.1007/s11277-024-11382-y137:1(153-197)Online publication date: 6-Jul-2024
- Wang ZXie WWang BTao JWang E(2021)A Survey on Recent Advanced Research of CPS SecurityApplied Sciences10.3390/app1109375111:9(3751)Online publication date: 21-Apr-2021
- Show More Cited By