CHATTAMVELLI, R. (2022). A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11(1), 49-58. Retrieve from https://www.ijisc.comCHATTAMVELLI, R., 2022. A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11(1), 49-58. Available from: https://www.ijisc.comR. CHATTAMVELLI, "A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 49-58, 2022. Available: https://www.ijisc.comCHATTAMVELLI, R., 'A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 49-58, (2022).CHATTAMVELLI, R.: A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11 (2022) 49-58. https://www.ijisc.comCHATTAMVELLI, R., (2022), A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11: 49-58. https://www.ijisc.com Citation Format :
MWENDA, A.,NGODYA, D., (2023). A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12(2), 27-34. Retrieve from https://www.ijisc.comMWENDA, A., NGODYA, D., 2023. A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12(2), 27-34. Available from: https://www.ijisc.comA. MWENDA, D. NGODYA, "A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 27-34, 2023. Available: https://www.ijisc.comMWENDA, A., NGODYA, D., 'A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 27-34, (2023).MWENDA, A.,NGODYA, D.,: A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12 (2023) 27-34. https://www.ijisc.comMWENDA, A., NGODYA, D., (2023), A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12: 27-34. https://www.ijisc.com Citation Format :
OATU, L. (2024). Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13(1), 59-65. Retrieve from https://www.ijisc.comOATU, L., 2024. Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13(1), 59-65. Available from: https://www.ijisc.comL. OATU, "Combating Man-in-the-Middle Attacks within IoT Systems," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 59-65, 2024. Available: https://www.ijisc.comOATU, L., 'Combating Man-in-the-Middle Attacks within IoT Systems', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 59-65, (2024).OATU, L.: Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13 (2024) 59-65. https://www.ijisc.comOATU, L., (2024), Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13: 59-65. https://www.ijisc.com Citation Format :