Using Internet Protocol Security to Create Tunnels to Communicate Securely on a Network
Jenna D DonVito, Zachary J Burns
openalex +1 more source
An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment with Corrective Network Reconfiguration- Part I: Methodology [PDF]
Arun Venkatesh Ramesh +2 more
openalex
Using blockchain in wireless sensor network data security [PDF]
Karim Jabur Karim +4 more
openalex +1 more source
Security of V2X communications in 3GPP - 5G cellular networks
Hadi Yakan
openalex +1 more source
A Survey on Various Security Attacks in Mobile Ad-Hoc Network
Akansha Shrivastava, Ekta Chauhan
openalex +1 more source
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement
PDGKI, IJCNP
openalex +1 more source
Analysis of network security problems and solutions for machine to machine communications / null
Abubakar Karabade
openalex +1 more source
Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records. [PDF]
Aziz Z, Bestak R.
europepmc +1 more source
Information Security Risk Assessment of Smartphones Using Bayesian Networks
Kristian Herland +2 more
openalex +2 more sources

