Sign in

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach.

Uzair JavaidFurqan JameelUmair JavaidMuhammad Toaha Raza KhanRiku Jäntti
Published in: Mob. Inf. Syst. (2020)
Keyphrases
  • mobile devices
  • key technologies
  • risk management
  • physical world
  • neural network
  • real world
  • artificial intelligence
  • data structure
  • real time
  • knowledge base
  • mobile phone
  • ubiquitous computing
  • mobile computing