Login / Signup

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.

Ashish KumarRahul SahaMauro ContiGulshan KumarWilliam J. BuchananTai-Hoon Kim
Published in: J. Netw. Comput. Appl. (2022)
Keyphrases
  • data sets
  • preprocessing
  • data mining
  • information retrieval
  • decision trees
  • case study
  • benchmark datasets
  • neural network
  • computer vision
  • computational cost
  • data management
  • decision rules
  • security analysis