共 32 条
- [2] Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
- [3] SoK: Security Evaluation of Home-Based IoT Deployments [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
- [4] Andrew Yevonnael, 2023, 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), P275, DOI 10.1109/ICoCICs58778.2023.10276627
- [5] Bharadiya J., 2023, Eur. J. Tech, V7, P1, DOI DOI 10.47672/EJT.1486
- [6] Bingjun He, 2021, 2021 IEEE 21st International Conference on Communication Technology (ICCT), P508, DOI 10.1109/ICCT52962.2021.9657857
- [7] Chang Yu, 2023, 2023 4th International Conference on Computers and Artificial Intelligence Technology (CAIT), P233, DOI 10.1109/CAIT59945.2023.10469250
- [8] Da Xu L., 2014, IEEE Transactions on industrial informatics, V10, P2233, DOI [DOI 10.1109/TII.2014.2300753, 10.1109/TII.2014.2300753]
- [9] Dasgupta D., 2020, J. Def. Model. Simul, V19, P57