共 160 条
- [31] BROOKS G, 1992, SIGPLAN NOTICES, V27, P1, DOI [10.1145/143103.143108, 10.13334/j.0258-8013.pcsee.213043]
- [32] Buennemeyer TK, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON PORTABLE INFORMATION DEVICES, P27
- [33] Cano Juan Carlos, 2018, IEEE Internet of Things Magazine, V1, P12, DOI 10.1109/IOTM.2019.1900002
- [34] Casino M, 2019, 2019 4TH INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS 2019), P136, DOI [10.1109/icsrs48664.2019.8987605, 10.1109/ICSRS48664.2019.8987605]
- [35] A Multi-Tier Security Analysis of Official Car Management Apps for Android [J]. FUTURE INTERNET, 2021, 13 (03): : 1 - 35
- [36] Process Automation in an IoT-Fog-Cloud Ecosystem: A Survey and Taxonomy [J]. IOT, 2021, 2 (01): : 92 - 118
- [37] Chen Shanzhi, 2023, Cellular Vehicle -to -Everything (C-V2X)
- [38] Automatic and Secure Wi-Fi Connection Mechanisms for IoT End-Devices and Gateways [J]. EMERGING TECHNOLOGIES IN COMPUTING, ICETIC 2018, 2018, 200 : 98 - 106
- [39] A Majority Voting Scheme in Wireless Sensor Networks for Detecting Suspicious Node [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 495 - 498
- [40] Cimpanu C, 2016, THIEVES USING R