共 123 条
[1]
Abdalla PeshrawAhmed., 2020, 2020 8 INT S DIGITAL, P1
[2]
Web-based Attacks to Discover and Control Local IoT Devices
[J].
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18),
2018,
:29-35
[4]
SoK: Security Evaluation of Home-Based IoT Deployments
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1362-1380
[5]
Alshahrani H., 2018, 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), P1, DOI [10.1109/LISAT.2018.8378035, DOI 10.1109/LISAT.2018.8378035]
[7]
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
[J].
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019),
2019,
[8]
[Anonymous], 2010, 2010 INT C BROADBAND, DOI DOI 10.1109/BWCCA.2010.85
[9]
Hacking NHS Pacemakers: A Feasibility Study
[J].
PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019),
2019,
:34-40