1
Smart Trends in Computing and Communications [E-Book] : Proceedings of SmartCom 2022 /
Table of Contents: ...Chapter 1. Implementation of Tweet Stream Summarization for Malicious Tweet Detection -- Chapter 2. Comparative Analysis of A Secure Authentication Protocol For 5g Enabled IoT Network Using Public and Shared Secret Key -- Chapter 3. DDOS Botnet Attack...

Full text 
2
Proceedings of Integrated Intelligence Enable Networks and Computing [E-Book] : IIENC 2020 /