共 31 条
- [1] Alhazmi A., COMPUTERS SOFTWARE A
- [2] A Replication Study for IoT Privacy Preferences [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 45 - 52
- [3] [Anonymous], 2021, AM RING IS LARG CIV
- [4] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
- [5] arstechnica, POL CAN GET YOUR RIN
- [6] Bowles N., 2018, NEW YORK TIMES
- [7] Campos D., 2021, CYBER SECURITY EXPER
- [8] IoT Malware Ecosystem in the Wild: A Glimpse into Analysis and Exposures [J]. SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 413 - 418
- [9] D. of Justice Computer Crime & Intellectual Property Section Criminal Division, 2017, SEC YOUR INT THINGS
- [10] Exploring How Privacy and Security Factor into IoT Device Purchase Behavior [J]. CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,