ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2107.01678
  4. Cited By
A Comprehensive Survey on the State-of-the-art Data Provenance
  Approaches for Security Enforcement

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

4 July 2021
Md Morshed Alam
Weichao Wang
ArXiv (abs)PDFHTML

Papers citing "A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement"

4 / 4 papers shown
Title
RESTRAIN: Reinforcement Learning-Based Secure Framework for Trigger-Action IoT Environment
Md Morshed Alam
Lokesh Chandra Das
Sandip Roy
Sachin Shetty
Weichao Wang
AAMLOffRL
163
0
0
12 Mar 2025
Security Approaches for Data Provenance in the Internet of Things: A
  Systematic Literature Review
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
Omair Faraj
David Megías
Joaquin Garcia-Alfaro
27
0
0
03 Jul 2024
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System
  to Mitigate Trigger-action IoT Attacks
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks
Md Morshed Alam
Israt Jahan
Charlotte
AAML
108
2
0
16 Jan 2024
IoTMonitor: A Hidden Markov Model-based Security System to Identify
  Crucial Attack Nodes in Trigger-action IoT Platforms
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
Md Morshed Alam
Md Sajidul Islam Sajid
Weichao Wang
Jinpeng Wei
35
6
0
09 Feb 2022
1