Review Article

Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions

Table 2

Robustness analysis against attacks

Sr. NoAuthorsInsertionDeletionReorderingReformattingCopy and pasteRetyping

1Al-Nofaie et al. [89]
2Rizzo et al. [90]
3Alotaibi et al. [75]
4Ahvanooey et al. [29]
5Alotaibi et al. [91]
6Ahvanooey et al. [31]
7Mir. [82]
8Por et al. [36]
9Chou et al. [92]
10Umair et al. [7]
11Alginahi et al. [35]
12Gutub et al. [78]
13Lee et al. [93]
14Bender et al. [94]
15Lu et al. [95]
16Mali et al. [24]
17Halvani et al. [96]
18Kim et al. [66]
19Meral et al. [97]
20Topkara et al. [98]