共 163 条
[2]
Abdo JB, 2017, 2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P45, DOI 10.1109/FMEC.2017.7946406
[3]
Aggarwal S., 2019, 2019 IEEE International Conference on Communications (ICC), P1, DOI DOI 10.1109/ICC.2019
[4]
Secure Ground Control Station-based Routing Protocol for UAV Networks
[J].
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE,
2019,
:794-798
[5]
Using Deep Networks for Drone Detection
[J].
2017 14TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS),
2017,
[6]
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
[J].
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS,
2008,
:505-510
[7]
Al-Emadi S, 2019, INT WIREL COMMUN, P459, DOI 10.1109/IWCMC.2019.8766732
[8]
A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
[J].
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018),
2018, 141
:24-31
[9]
Alladi Tejasvi, 2020, Vehicular Communications, V23, DOI 10.1016/j.vehcom.2020.100249