Login / Signup

Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks.

V. BalajiP. Selvaraj
Published in: Comput. Syst. Sci. Eng. (2022)
Keyphrases
  • countermeasures
  • image registration
  • pose estimation
  • computer networks
  • network model
  • network design
  • objective function
  • complex systems
  • end to end
  • network analysis