تصفح Accounting & Information Systems حسب الموضوع "security requirements"
السجلات المعروضة 1 -- 1 من 1
-
Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The Internet of Thing (IoT) is one of the most imperative technology for all organizations that's play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. ...