共 25 条
[1]
Ageed Z., 2023, Cloud Analysis for Machine Learning Methods Implementation Based on IoT, Information Systems, and Web Technology, V1, P664, DOI [10.17605/OSF.IO/B68WU, DOI 10.17605/OSF.IO/B68WU]
[3]
Arthur C., 2013, The Guardian 17-Jul
[5]
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
[J].
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY,
2022, 3
:251-281
[6]
Bentham's Gaze, 2016, A Privacy Enhancing Architecture for Secure Wearable Devices
[7]
Cavoukian A, 2011, Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era, DOI [10.4018/978-1-61350-501-4.ch007, DOI 10.4018/978-1-61350-501-4.CH007]
[8]
Ching K.W., 2016, Int. J. Netw. Secur. Its Appl., V8, P19, DOI 10.5121/ijnsa.2016.8302
[9]
Intrusion detection systems for IoT-based smart environments: a survey
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2018, 7