共 43 条
[1]
Adeel A., Ali M., Khan A.N., Khalid T., Rehman F., Jararweh Y., Shuja J., A multi‐attack resilient lightweight IoT authentication scheme, Trans. Emerg. Telecommun. Technol, 33, 3, (2019)
[2]
Khurshid A., Khan A.N., Khan F.G., Ali M., Shuja J., Khan A.R., Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs, Concurr. Comput, 31, 8, pp. 1-22, (2018)
[3]
Abhijit S.B., Umesh A.S., Attacks on wireless network and basic tips for securing Wi-Fi zone, IJIRMPS, 4, 3, (2018)
[4]
Al-Shargabi B., Al-Jawarneh S., Hayajneh S., A cloudlet based security and trust model for E-government web services, J. Theor. Appl. Inf. Technol, 98, pp. 27-37, (2020)
[5]
Zhu B., Hou X., Liu S., Ma W., Dong M., IoT equipment monitoring system based on C5.0 decision tree and time-series analysis, IEEE Access, 10, pp. 36637-36648, (2021)
[6]
Bloom C., Tan J., Ramjohn J., Bauer L., Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles, Proc. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 357-375, (2017)
[7]
Wu C-J., Tie Y., Hara S., Tamiya K., Fujita A., Yoshioka K., Matsumoto T., Iotprotect: Highly deployable whitelist-based protection for low-cost internet-of-things devices, J. Inf. Process, 26, pp. 662-672, (2018)
[8]
Maple C., Security and privacy in the internet of things, J. Cyber Policy, 2, 2, pp. 155-184, (2017)
[9]
Fang D., Qian Y., Hu R.Q., Security for 5G mobile wireless networks, IEEE Access, 6, pp. 4850-4874, (2018)
[10]
Fauri D., Kapsalakis M., dos Santos D.R., Costante E., den Hartog J., Etalle S., Role inference+ anomaly detection= situational awareness in BACnet networks, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2019. Lecture Notes in Computer Science, 11543, pp. 461-481, (2019)