Login / Signup
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem.
Burhan Ul Islam Khan
Rashidah Funke Olanrewaju
Farhat Anwar
Roohie Naaz Mir
Athaur Rahman Najeeb
Published in:
Int. J. Inf. Comput. Secur. (2019)
Keyphrases
</>
machine learning methods
computational cost
database
computationally expensive
information retrieval
significant improvement
probabilistic model
methods require