共 20 条
[1]
Chen Q., Song Y., Jennings B., Zhang F., Xiao B., Gao S., IoT-ID: robust IoT device identification based on feature drift adaptation, 2021 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, (2021)
[2]
Yu D., Zhang L., Chen Y., Ma Y., Chen J., Large-scale IoT devices firmware identification based on weak password, IEEE Access, 8, pp. 7981-7992, (2020)
[3]
Wang J., Et al., IoT-praetor: undesired behaviors detection for IoT devices, IEEE Internet of Things Journal, 8, pp. 927-940, (2021)
[4]
Yang H., Et al., Blockchain-enabled tripartite anonymous identification trusted service provisioning in industrial IoT, IEEE Internet of Things Journal, 9, pp. 2419-2431, (2022)
[5]
Chi Z., Valehi A., Peng H., Kozicki M., Razi A., Consistency penalized graph matching for image-based identification of dendritic patterns, IEEE Access, 8, pp. 118623-118637, (2020)
[6]
Lu Y., Xu L.D., Internet of things (IoT) cybersecurity research: a review of current research topics, IEEE Internet of Things Journal, 6, pp. 2103-2115, (2019)
[7]
Razzaque M.A., Enabling efficient and scalable service search in IoT with topic modeling: an evaluation, IEEE Access, 9, pp. 53452-53465, (2021)
[8]
Tseng K.-K., Liu L., Wang C., Yung K.L., Ip W.H., Hsu C.-Y., Robust multistage ECG identification for astronaut spacesuits with IoT applications, IEEE Access, 7, pp. 111662-111677, (2019)
[9]
Sharma V., You I., Yim K., Chen I.-R., Cho J.-H., BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems, IEEE Access, 7, pp. 118556-118580, (2019)
[10]
Dao N., Kim Y., Jeong S., Park M., Cho S., Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications, IEEE Access, 5, pp. 26743-26753, (2017)