Login / Signup
Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks.
V. Balaji
P. Selvaraj
Published in:
Comput. Syst. Sci. Eng. (2022)
Keyphrases
</>
countermeasures
image registration
pose estimation
computer networks
network model
network design
objective function
complex systems
end to end
network analysis