has been cited by the following article(s):
[1]
|
Vulnerability and Threat Assessment Framework for Internet of Things Systems
2023 6th Conference on Cloud and Internet of Things (CIoT),
2023
DOI:10.1109/CIoT57267.2023.10084894
|
|
|
[2]
|
The Impact of Radio Frequency (RF) Attacks on Security and Privacy: A Comprehensive Review
Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security,
2023
DOI:10.1145/3607720.3607771
|
|
|
[3]
|
Vulnerability and Threat Assessment Framework for Internet of Things Systems
2023 6th Conference on Cloud and Internet of Things (CIoT),
2023
DOI:10.1109/CIoT57267.2023.10084894
|
|
|
[4]
|
An automated context-aware IoT vulnerability assessment rule-set generator
Computer Communications,
2022
DOI:10.1016/j.comcom.2022.01.022
|
|
|
[5]
|
An automated context-aware IoT vulnerability assessment rule-set generator
Computer Communications,
2022
DOI:10.1016/j.comcom.2022.01.022
|
|
|
[6]
|
Computational Intelligence Methods in COVID-19: Surveillance, Prevention, Prediction and Diagnosis
Studies in Computational Intelligence,
2021
DOI:10.1007/978-981-15-8534-0_5
|
|
|