共 38 条
- [31] Qaddoori S.L., Ali Q.I., An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure, IET Information Security, (2022)
- [32] Dangi R., Jadhav A., Choudhary G., Dragoni N., Mishra M.K., Lalwani P., Ml-based 5g network slicing security: a comprehensive survey, Future Internet, 14, (2022)
- [33] Al-Ayed F., Hu C., Liu H., An efficient practice of privacy implementation: kerberos and markov chain to secure file transfer sessions, International Journal of Network Security, 20, 4, pp. 655-663, (2018)
- [34] Kalaichelvi V., Vimala D.P., Meenakshi P., Swaminathan S., Suganya S., Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion, Journal of Intelligent Fuzzy Systems, 5, pp. 6697-6708, (2022)
- [35] Yasin G.Y., Israr A., Hanan A., Munkhjargal G., Suliman A.A., Ahmad J., Jeongmin P., Extrinsic Behavior Prediction of Pedestrians via Maximum Entropy Markov Model and Graph-Based Features Mining, Applied Sciences, 12, (2022)
- [36] Li B., Optimisation of UCB algorithm based on cultural content orientation of film and television in the digital era, International Journal of Networking and Virtual Organisations, 2-4, pp. 265-280, (2023)
- [37] Achar S., Faruqui N., Whaiduzzaman M., Awajan A., Alazab M., Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing, Electronics, 8, (2023)
- [38] Yalcinkaya F., AydiLek H., Erten M.Y., INanc N., IoT based Smart Home Testbed using MQTT Communication Protocol, Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi317-317, (2020)