Open Access
REVIEW
Wufei Wu1, Javad Hassannataj Joloudari2,3,4, Senthil Kumar Jagatheesaperumal5, Kandala N. V. P. S. Rajesh6, Silvia Gaftandzhieva7,*, Sadiq Hussain8, Rahimullah Rabih9, Najibullah Haqjoo10, Mobeen Nazar11, Hamed Vahdat-Nejad9, Rositsa Doneva12
1 School of Information Engineering, Nanchang University, Nanchang, 330031, China
2 Department of Computer Engineering, Technical and Vocational University (TVU), Tehran, 4631964198, Iran
3 Department of Computer Engineering, University of Birjand, Birjand, 9717434765, Iran
4 Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, 3738147471, Iran
5 Department of Electronics & Communication Engineering, Mepco Schlenk Engineering College, Sivakasi, 626 005, India
6 School of Electronics Engineering, VIT-AP University, Near Vijayawada, 522 237, India
7 Faculty of Mathematics and Informatics, University of Plovdiv Paisii Hilendarski, Plovdiv, 4000, Bulgaria
8 Examination Branch, Dibrugarh University, Dibrugarh, 786004, India
9 Department of Computer Engineering, Faculty of Engineering, University of Birjand, Birjand, 9717434765, Iran
10 Faculty of Electrical and Computer Engineering, University of Birjand, Birjand, 9717434765, Iran
11 Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Kuala Lumpur, 50250, Malaysia
12 Faculty of Physics and Technology, University of Plovdiv Paisii Hilendarski, Plovdiv, 4000, Bulgaria
* Corresponding Author: Silvia Gaftandzhieva. Email:
(This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.053037
Received 23 April 2024; Accepted 09 July 2024; Published online 25 July 2024
View
Download
Like
Securing Display Path for Security-Sensitive Applications on Mobile Devices
Jinhua Cui, Yuanyuan Zhang, Zhiping...A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal
Jaideep Kaur, Kamaljit KaurMulti-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Chak Fong Cheang, Yiqin Wang,...Design of Feedback Shift Register of Against Power Analysis Attack
Yongbin Zhao, XuYang, RanranLi