Open Access
ARTICLE
Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6
1 Department of Computer Science, Abasyn University, Islamabad, 44000, Pakistan
2 Department of Computer Science, National University of Technology, Islamabad, 44000, Pakistan
3 Future Technology Research Center, National Yunlin University of Science and Technology, Douliu, Yunlin, 64002, Taiwan
4 Institute of Information Society, University of Public Service, Budapest, 1083, Hungary
5 John von Neumann Faculty of Informatics, Obuda University, Budapest, Hungary
6 Institute of Information Engineering, Automation and Mathematics, Slovak University of Technology in Bratislava, Slovakia
* Corresponding Author: Shahab S. Band. Email:
Computers, Materials & Continua 2023, 74(2), 2641-2659. https://doi.org/10.32604/cmc.2023.028796
Received 18 February 2022; Accepted 25 May 2022; Issue published 31 October 2022
View
Download
Like
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
Weidong Fang, Wuxiong Zhang, QianQian...A Convolution-Based System for Malicious URLs Detection
Chaochao Luo, Shen Su, Yanbin...Data Security Defense and Algorithm for Edge Computing Based on Mean Field Game
Chengshan Qian, Xue Li, Ning Sun,...