-
1
-
2
-
3
False data injection attacks and the insider threat in smart systems
Veröffentlicht in Computers & security
VolltextArtikel -
4
Real-Time Cyber Attack Detection Over HoneyPi Using Machine Learning
Veröffentlicht in Tehnički vjesnik
VolltextArtikel -
5
-
6
-
7
Network Forensics of RPL-Based Attacks
Veröffentlicht in Düzce Üniversitesi bilim ve teknoloji dergisi (Online)
VolltextArtikel -
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20