Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features

  • Inam Ullah
  • , Asra Noor*
  • , Shah Nazir
  • , Farhad Ali
  • , Yazeed Yasin Ghadi
  • , Nida Aslam
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

38 Scopus citations

Fingerprint

Dive into the research topics of 'Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features'. Together they form a unique fingerprint.

Computer Science