Citation Impact

Citing Papers

Let me answer that for you: exploiting broadcast information in cellular networks
2013
Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments
2018
Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques
2019 Standout
A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
2016
New privacy issues in mobile telephony
2012
IoT security: Review, blockchain solutions, and open challenges
2017 Standout
SCA: A Sine Cosine Algorithm for solving optimization problems
2016 Standout
A Comprehensive Study of Security of Internet-of-Things
2016
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
2023 Standout
Enforcing security in Internet of Things frameworks: A Systematic Literature Review
2019
A survey of intrusion detection in wireless network applications
2014
Biogeography-Based Optimization
2008 Standout
Analysis of exploration and exploitation in evolutionary algorithms by ancestry trees
2011
A Formal Analysis of 5G Authentication
2018 Standout
A Tucker Deep Computation Model for Mobile Multimedia Feature Learning
2017 Standout
Exploration and exploitation in evolutionary algorithms
2013
A comprehensive review of firefly algorithms
2013 Standout
A Survey on the Edge Computing for the Internet of Things
2017 Standout
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Equilibrium optimizer: A novel optimization algorithm
2019 Standout
The Speciating Island Model: An alternative parallel evolutionary algorithm
2006
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
2019

Works of Nicholas Hopper being referenced

Location leaks over the GSM air interface.
2012
Analysis of genetic diversity through population history
1999
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
2011
Rankless by CCL
2026