Cited By
View all- Alsubhi K(2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
- Wang RQiu HLiu Z(2024)KNI-DRL: Key Nodes Identification Method Based on Deep Reinforcement Learning in Inter-domain Routing Networks2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10603253(698-705)Online publication date: 19-Apr-2024
- Khaloopour LSu YRaskob FMeuser TBless RJanzen LAbedi KAndjelkovic MChaari HChakraborty PKreutzer MHollick MStrufe TFranchi NJamali V(2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
- Show More Cited By


