ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.05958
  4. Cited By
Toward Secure Edge Networks Taming Device to Device (D2D) Communication
  in IoT

Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT

16 December 2017
I. Hafeez
Aaron Yi Ding
M. Antikainen
Sasu Tarkoma
ArXivPDFHTML

Papers citing "Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT"

5 / 5 papers shown
Title
IDIoT: Securing the Internet of Things like it's 1994
IDIoT: Securing the Internet of Things like it's 1994
David Barrera
Ian Molloy
Heqing Huang
34
27
0
11 Dec 2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Yair Meidan
Michael Bohadana
A. Shabtai
Martín Ochoa
Nils Ole Tippenhauer
J. Guarnizo
Yuval Elovici
42
211
0
14 Sep 2017
Traffic-aware Patching for Cyber Security in Mobile IoT
Traffic-aware Patching for Cyber Security in Mobile IoT
Shin-Ming Cheng
Pin-Yu Chen
Ching-Chao Lin
H. Hsiao
40
50
0
15 Mar 2017
IoT Sentinel: Automated Device-Type Identification for Security
  Enforcement in IoT
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
Markus Miettinen
Samuel Marchal
I. Hafeez
Nadarajah Asokan
A. Sadeghi
Sasu Tarkoma
62
612
0
15 Nov 2016
SMOTE: Synthetic Minority Over-sampling Technique
SMOTE: Synthetic Minority Over-sampling Technique
Nitesh Chawla
Kevin W. Bowyer
Lawrence Hall
W. Kegelmeyer
AI4TS
371
25,646
0
09 Jun 2011
1