共 29 条
[1]
Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
[3]
A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2021, 24 (01)
:37-55
[4]
Almomani Omar, 2021, 2021 International Conference on Information Technology (ICIT), P440, DOI 10.1109/ICIT52682.2021.9491770
[6]
Anand A., 2012, International Journal of Advanced Research in Computer Science and Software Engineering, V2
[7]
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1007/BF00058655
[8]
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[9]
Cho EJ, 2009, LECT NOTES COMPUT SC, V5787, P515
[10]
SD, 2021, Journal of Trends in Computer Science and Smart Technology, V3, P59, DOI 10.36548/jtcsst.2021.1.006