共 50 条
- [1] Alzubaidi Mahmood, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P369, DOI 10.1109/ICITECH.2017.8080028
- [2] Alzubaidi M., 2018, J. Commun., V13, P198, DOI [10.12720/jcm.13.5.198-208, DOI 10.12720/JCM.13.5.198-208]
- [3] An Ga Hyeon, 2022, International Journal of Computer Networks and Applications, P169, DOI 10.22247/ijcna/2022/212333
- [4] ANRG, 2016, COOJ SIM
- [6] Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT [J]. APPLIED SCIENCES-BASEL, 2020, 10 (18):
- [8] Browning Jim, 2016, 2016 IEEE International Conference on Plasma Science (ICOPS), DOI 10.1109/PLASMA.2016.7533988
- [9] Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
- [10] Choudhary S, 2019, I C COMP SYST APPLIC, DOI 10.1109/aiccsa47632.2019.9035319