共 76 条
- [61] CHOUCHANE A, REKHIS S, BOUDRIGA N., Defending against rogue base station attacks using wavelet based fingerprinting, Proceedings of 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 523-530, (2009)
- [62] XU Q, ZHENG R, SAAD W, Et al., Device fingerprinting in wireless networks: challenges and opportunities, IEEE Communications Surveys & Tutorials, 18, 1, pp. 94-104, (2016)
- [63] POLAK A C, GOECKEL D L., Wireless device identification based on RF oscillator imperfections, IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2492-2501, (2015)
- [64] LIU Ming, LIU Nian, HAN Xiaoyi, Et al., A RF fingerprint based EIoT device identification method, Electric Power, 54, 3, pp. 80-88, (2021)
- [65] WANG W, YANG L, ZHANG Q, Et al., Securing on-body IoT devices by exploiting creeping wave propagation, IEEE Journal on Selected Areas in Com-munications, 36, 4, pp. 696-703, (2018)
- [66] XIAO Yong, QIAN Bin, CAI Ziwen, Et al., Malicious wireless communication link detection of power internet of thing devices, Transactions of China Electrotechnical Society, 35, 11, pp. 2319-2327, (2020)
- [67] LUO Junzhou, YANG Ming, LING Zhen, Et al., Anonymous communication and darknet: a survey, Journal of Computer Research and Development, 56, 1, pp. 103-130, (2019)
- [68] KORONIOTIS N, MOUSTAFA N, SITNIKOVA E., Forensics and deep learning mechanisms for botnets in internet of things: a survey of challenges and solutions, IEEE Access, 7, pp. 61764-61785, (2019)
- [69] LI Yun, HUANG Chenlin, WANG Zhongfeng, Et al., Survey of software vulnerability mining methods based on machine learning, Journal of Software, 31, 7, pp. 2040-2061, (2020)
- [70] HSU J., DARPA challenge tests AI as cybersecurity defenders, IEEE Spectrum, (2016)