共 20 条
[11]
Razzaque M.A., Milojevic-Jevric M., Palade A., Clarke S., Middleware for internet of things: a survey, IEEE Internet of Things Journal, 3, pp. 70-95, (2016)
[12]
Ahn N.Y., Lee D.H., Security of IoT device: perspective forensic/anti-forensic issues on invalid area of NAND flash memory, IEEE Access, 10, pp. 74207-74219, (2022)
[13]
Cai Z., Bourgeois A., Tong W., Guest editorial: special issue on internet of things, Tsinghua Science and Technology, 22, pp. 343-344, (2017)
[14]
Sciancalepore S., Pietro R.D., PPRQ: privacy-preserving MAX/MIN range queries in IoT networks, IEEE Internet of Things Journal, 8, pp. 5075-5092, (2021)
[15]
Ullah, Mahmoud Q.H., Design and development of RNN anomaly detection model for IoT networks, IEEE Access, 10, pp. 62722-62750, (2022)
[16]
Liang F., Yu W., Liu X., Griffith D., Golmie N., Toward edge-based deep learning in industrial internet of things, IEEE Internet of Things Journal, 7, pp. 4329-4341, (2020)
[17]
Chen B., Xiang T., Ma M., He D., Liao X., CL-ME: efficient certificateless matchmaking encryption for internet of things, IEEE Internet of Things Journal, 8, pp. 15010-15023, (2021)
[18]
Nandy T., Et al., Review on security of internet of things authentication mechanism, IEEE Access, 7, pp. 151054-151089, (2019)
[19]
Kamilaris, Pitsillides A., Mobile phone computing and the internet of things: a survey, IEEE Internet of Things Journal, 3, pp. 885-898, (2016)
[20]
Wang M.D., Dohler M., Mao X., Hu R.Q., Wang H., Guest editorial - special issue on internet of things (IoT): architecture, protocols and services, IEEE Sensors Journal, 13, pp. 3505-3510, (2013)