End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations

Mohamed Hammad, Abdullah M. Iliyasu, Ibrahim A. Elgendy, Ahmed A.Abd El-Latif

Research output: Contribution to journalArticlepeer-review

35 Scopus citations

Fingerprint

Dive into the research topics of 'End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations'. Together they form a unique fingerprint.

Computer Science