Login / Signup
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
Ashish Kumar
Rahul Saha
Mauro Conti
Gulshan Kumar
William J. Buchanan
Tai-Hoon Kim
Published in:
J. Netw. Comput. Appl. (2022)
Keyphrases
</>
data sets
preprocessing
data mining
information retrieval
decision trees
case study
benchmark datasets
neural network
computer vision
computational cost
data management
decision rules
security analysis