Keywords:
Exploit Enabling Computer science Internet of Things Computer security Key (lock) Smart city Information and Communications Technology Mainstream World Wide Web

Metrics

16
Cited By
3.59
FWCI (Field Weighted Citation Impact)
22
Refs
0.93
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Designing smart city mobile applications

Roselane Silva FariasRenata Maria de SouzaJohn D. McGregorEduardo Santana de Almeida

Journal:   Empirical Software Engineering Year: 2019 Vol: 24 (6)Pages: 3255-3289
BOOK-CHAPTER

Designing Secure Integration Architectures

GM JonsdottirL. DavisRose Gamble

Lecture notes in computer science Year: 2003 Pages: 112-122
BOOK-CHAPTER

Designing Secure Network Architectures

Seshagirirao LekkalaPriyanka Gurijala

Apress eBooks Year: 2024 Pages: 75-86
JOURNAL ARTICLE

Foundations for Designing Secure Architectures

Jan Jürjens

Journal:   Electronic Notes in Theoretical Computer Science Year: 2005 Vol: 142 Pages: 31-46
© 2026 ScienceGate Book Chapters — All rights reserved.