• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Modified graph-based algorithm to analyze security threats in IoT.

Ferhat AratSedat Akleylek
Published in: PeerJ Comput. Sci. (2023)
Keyphrases
  • security threats
  • graph based algorithm
  • key management
  • security issues
  • security mechanisms
  • cloud computing
  • wireless sensor networks
  • data mining
  • information security
  • information systems
  • matching algorithm