1
Joshi, Amit
2023
Table of Contents:
“...Chapter 1. Implementation of Tweet Stream Summarization for Malicious Tweet Detection -- Chapter 2. Comparative Analysis of A Secure Authentication Protocol For 5g Enabled IoT Network Using Public and Shared Secret Key -- Chapter 3. DDOS Botnet Attack...”2023
Full text
2
3