0 | -- | 0 | Angelo Coluccia, Alessio Fascista. An alternative procedure to cumulative sum for cyber-physical attack detection |
0 | -- | 0 | Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro. Hypergraph-driven mitigation of cyberattacks |
0 | -- | 0 | Michele Roccotelli, Massimiliano Nolich, Maria Pia Fanti, Walter Ukovich. Internet of things and virtual sensors for electromobility |
0 | -- | 0 | Sana Rekik, Nouha Baccour, Mohamed Jmaiel, Khalil Drira. A performance analysis of Orchestra scheduling for time-slotted channel hopping networks |
0 | -- | 0 | Zan Zhou, Yuansong Qiao, Liang Zhu, Jianfeng Guan, Yang Liu, Changqiao Xu. Differential privacy-guaranteed trajectory community identification over vehicle ad-hoc networks |
0 | -- | 0 | Ngoc-Tu Nguyen 0002, Ming C. Leu, Sherali Zeadally, Bing-Hong Liu, Shao-I Chu. Optimal solution for data collision avoidance in radio frequency identification networks |
0 | -- | 0 | Sanjay Kumar Biswash, Dushantha Nalin K. Jayakody. A network performance-based device driven communication scheme for 5G networks |
0 | -- | 0 | Pan Wang, Feng Ye, Xuejiao Chen. Smart devices information extraction in home Wi-Fi networks |
0 | -- | 0 | Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini. Securing the smart home: A real case study |
0 | -- | 0 | Zakaria Maamar, Noura Faci, Slim Kallel, Mohamed Sellami, Emir Ugljanin. Software agents meet internet of things |