Follow

IoT Security and Authentication schemes Based on Machine Learning: Review. (arXiv:2109.02695v1 [cs.CR]) arxiv.org/abs/2109.02695

· · feed2toot · 0 · 0 · 0
Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.