Open Access
ARTICLE
Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1
1 Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, 50603, Malaysia
2 Department of Computer Science, University of Swat, Saidu Sharif, 19130, Pakistan
3 Center for Research in Mobile Cloud Computing, University of Malaya, Kuala Lumpur, 50603, Malaysia
4 Department of Quantitative Methods and Economic Informatics, Faculty of Operation and Economics of Transport and Communications, University of Zilina, 010 26 Zilina, Slovakia
5 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
6 Department of Computer Science, College of Sciences and Arts in Rass, Qassim University, Buraydah, 51452, Saudi Arabia
7 Department of Computer Science, Hamdard Institute of Engineering and Technology, Islamabad, 44000, Pakistan
* Corresponding Author: Mohd Yamani Idna Idris. Email:
(This article belongs to this Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)
Computers, Materials & Continua 2022, 71(2), 2515-2532. https://doi.org/10.32604/cmc.2022.019800
Received 26 April 2021; Accepted 30 June 2021; Issue published 07 December 2021
View
Download
Like
A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security
Changting ShiSecurity Analysis of Smart Speaker: Security Attacks and Mitigation
Youngseok Park, Hyunsang Choi,...Cogent and Energy Efficient Authentication Protocol for WSN in IoT
Tariq Mahmood Butt, Rabia Riaz,...A CPK-Based Identity Authentication Scheme for IoT
Mingming Zhang, Jiaming Mao, Yuanyuan...