References
- Gaurav, A., Gupta, B. B., & Panigrahi, P. K. (2022). A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems, 1-25.
- Mirsadeghi, F., Rafsanjani, M. K., & Gupta, B. B. (2021). A trust infrastructure-based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications, 14(4), 2537-2553. doi: https://doi.org/10.1007/s12083-020-01010-4
- Wang, C., Shen, J., Vijayakumar, P., & Gupta, B. B. (2021). Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems.
- Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. Soft Computing: Theories and Applications.
- Neil Davey, Paul Barson, Simon Field, and Ray J Frank. The development of a software clone detector. pages 1-18, London, UK, 1995.
- Tiwari, A., & Sharma, R. M. (2018). Realm Towards Service Optimization in Fog Computing. In Proceedings of the International Journal of Fog Computing (IJFC)” IGI Global.
- Cvitić, I., Peraković, D., Gupta, B., & Choo, K. K. R. (2021). Boosting-based DDoS Detection in Internet of Things Systems. IEEE Internet of Things Journal.
- Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 610-617.
- John Krumm. A survey of computational location privacy. Personal Ubiquitous Computation, 13(6), August 2009.
- Xiao Pan, Jianliang Xu, and Xiaofeng Meng. Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 2012.
- Kaur, M., Singh, D., Kumar, V., Gupta, B. B., & Abd El-Latif, A. A. (2021). Secure and Energy efficient based E-health Care Framework for Green Internet of Things. IEEE Transactions on Green Communications and Networking.
- Bugra Gedik and Ling Liu. Location privacy in mobile systems: A personalized anonymization model 2005. IEEE Computer Society.