2020
DOI: 10.1049/iet-ifs.2019.0203
|View full text |Cite
|
Sign up to set email alerts
|

GUIM‐SMD: guilty user identification model using summation matrix‐based distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Hence, the system works fluently even if any breakdown has happened and data leakage is controlled. [58][59][60][61][62]. 1 shows, the comparison between various IEEE wireless standards mentioning their frequency, data rate, range, and type [63].…”
Section: Comparative Analysismentioning
confidence: 99%
“…Hence, the system works fluently even if any breakdown has happened and data leakage is controlled. [58][59][60][61][62]. 1 shows, the comparison between various IEEE wireless standards mentioning their frequency, data rate, range, and type [63].…”
Section: Comparative Analysismentioning
confidence: 99%
“…Encryption hides information. This is the science used to keep information safe and private [60]. At its core, encryption is a approach used to securely transmit data among two parties without being compromised by outside factors.…”
Section: Data Security Modelmentioning
confidence: 99%
“…However, with the explosive evolution of data, an enormous pressure emerges to the enterprises for storing the voluminous data locally [3]. Also, it has become difficult to explore the data due to limited resources [4]. Most of the businesses have shifted to the cloud for these services due to its several advantages such as on-demand service, scalability, reliability, elasticity, measured services, disaster recovery, accessibility, and many others [5].…”
Section: Introductionmentioning
confidence: 99%