Modified graph-based algorithm to analyze security threats in IoT
,
1,244 views · 78 downloads
SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm
, ,
1,511 views · 157 downloads
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
,
1,075 views · 185 downloads
A novel IoT-based health and tactical analysis model with fog computing
,
2,060 views · 940 downloads