Login / Signup
Enabling Second Factor Authentication for Drones in 5G using Network Slicing.
Mai A. Abdel-Malek
Kemal Akkaya
Arupjyoti Bhuyan
Mumin Cebe
Ahmed S. Ibrahim
Published in:
GLOBECOM (Workshops) (2020)
Keyphrases
</>
factor authentication
feature extraction
network traffic
computer networks
wireless sensor networks
network structure