Cited By
View all- Kumar NKasbekar GManjunath D(2023)Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust AlgorithmACM SIGMETRICS Performance Evaluation Review10.1145/3595244.359524750:4(5-7)Online publication date: 27-Apr-2023
- Aissaoui RDeneuville JGuerber CPirovano A(2023)A survey on cryptographic methods to secure communications for UAV traffic managementVehicular Communications10.1016/j.vehcom.2023.10066144:COnline publication date: 1-Dec-2023
- Sivanesh SSarma Dhulipala V(2022)Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-021-09418-8124:2(1511-1524)Online publication date: 1-May-2022
- Show More Cited By