• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem.

Burhan Ul Islam KhanRashidah Funke OlanrewajuFarhat AnwarRoohie Naaz MirAthaur Rahman Najeeb
Published in: Int. J. Inf. Comput. Secur. (2019)
Keyphrases
  • machine learning methods
  • computational cost
  • database
  • computationally expensive
  • information retrieval
  • significant improvement
  • probabilistic model
  • methods require