Cited By
View all- Altaweel AAslam SKamel I(2024)Security attacks in Opportunistic Mobile Networks: A systematic literature reviewJournal of Network and Computer Applications10.1016/j.jnca.2023.103782221(103782)Online publication date: Jan-2024
- Gellert AZamfirescu C(2020)Using Two-Level Context-Based Predictors for Assembly Assistance in Smart FactoriesIntelligent Methods in Computing, Communications and Control10.1007/978-3-030-53651-0_14(167-176)Online publication date: 28-Jul-2020
- Dangwal DCui WMcMahan JSherwood TBahar IHerlihy MWitchel ELebeck A(2019)Safer Program Behavior Sharing Through Trace WringingProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304074(1059-1072)Online publication date: 4-Apr-2019
- Show More Cited By