共 111 条
[1]
Adnan AH, 2015, INT CONF ADV ELECTR, P165, DOI 10.1109/ICAEE.2015.7506822
[2]
IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey
[J].
IEEE ACCESS,
2017, 5
:18187-18210
[3]
Ajlouni M.I.A., 2013, J. Inf. Eng. Appl, V3, P6
[4]
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
[J].
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS),
2019,
[6]
Al-Rabiaah S, 2018, 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), DOI 10.1109/NCG.2018.8593143
[7]
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[9]
Denial of Service and Man-in-the-Middle Attacks against IoT Devices in a GPS-based Monitoring Software for Intelligent Transportation Systems
[J].
2020 19TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET),
2020,
[10]
Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571