Login / Signup

A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem.

Burhan Ul Islam KhanRashidah Funke OlanrewajuFarhat AnwarRoohie Naaz MirAthaur Rahman Najeeb
Published in: Int. J. Inf. Comput. Secur. (2019)
Keyphrases
  • machine learning methods
  • computational cost
  • database
  • computationally expensive
  • information retrieval
  • significant improvement
  • probabilistic model
  • methods require