• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4635964)   Today's Articles (369)   Subscriber (50055)
For: Apostol I, Preda M, Nila C, Bica I. IoT Botnet Anomaly Detection Using Unsupervised Deep Learning. Electronics 2021;10:1876. [DOI: 10.3390/electronics10161876] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Junaid SB, Imam AA, Balogun AO, De Silva LC, Surakat YA, Kumar G, Abdulkarim M, Shuaibu AN, Garba A, Sahalu Y, Mohammed A, Mohammed TY, Abdulkadir BA, Abba AA, Kakumi NAI, Mahamad S. Recent Advancements in Emerging Technologies for Healthcare Management Systems: A Survey. Healthcare (Basel) 2022;10:1940. [PMID: 36292387 PMCID: PMC9601636 DOI: 10.3390/healthcare10101940] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/01/2022] [Revised: 09/26/2022] [Accepted: 09/28/2022] [Indexed: 11/16/2022]  Open
2
A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats. Symmetry (Basel) 2022. [DOI: 10.3390/sym14030549] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/25/2023]  Open
3
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. ELECTRONICS 2021. [DOI: 10.3390/electronics10212647] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA