[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/icc/GabaNBKM23>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Aaisha_Makkar>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Anushka_Nehra>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Ishan_Budhiraja>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Shivani_Gaba>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Vimal_Kumar_0002>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FICCWorkshops57953.2023.10283524>
foaf:homepage <https://doi.org/10.1109/ICCWorkshops57953.2023.10283524>
dc:identifier DBLP conf/icc/GabaNBKM23 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FICCWorkshops57953.2023.10283524 (xsd:string)
dcterms:issued 2023 (xsd:gYear)
rdfs:label An Optimized Approach for Intrusion Detection in Internet of Softwarized Things. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Aaisha_Makkar>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Anushka_Nehra>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Ishan_Budhiraja>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Shivani_Gaba>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Vimal_Kumar_0002>
swrc:pages 648-653 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/icc/2023w>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/icc/GabaNBKM23/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/icc/GabaNBKM23>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/icc/icc2023w.html#GabaNBKM23>
rdfs:seeAlso <https://doi.org/10.1109/ICCWorkshops57953.2023.10283524>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/icc>
dc:title An Optimized Approach for Intrusion Detection in Internet of Softwarized Things. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document