Cited By
View all- Alsubhi K(2024)A Secured Intrusion Detection System for Mobile Edge ComputingApplied Sciences10.3390/app1404143214:4(1432)Online publication date: 9-Feb-2024
- Liao LMa XZhao CLi ZChao H(2023)FEAROL: Aging Flow Entries Based on Local Staircase Randomized Response for Secure SDN Flow TablesApplied Sciences10.3390/app1305298513:5(2985)Online publication date: 25-Feb-2023
- Okada SAkashi KMiyamoto DSekiya YTakase HNakamura H(2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee NetworkJournal of Information Processing10.2197/ipsjjip.31.53731(537-549)Online publication date: 2023
- Show More Cited By




