Login / Signup

Enabling Second Factor Authentication for Drones in 5G using Network Slicing.

Mai A. Abdel-MalekKemal AkkayaArupjyoti BhuyanMumin CebeAhmed S. Ibrahim
Published in: GLOBECOM (Workshops) (2020)
Keyphrases
  • factor authentication
  • feature extraction
  • network traffic
  • computer networks
  • wireless sensor networks
  • network structure