共 102 条
[1]
Aafer Y, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2759
[2]
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
[J].
JOURNAL OF CYBERSECURITY,
2018, 4 (01)
[3]
Ali W., 2017, 2017 23 INT C AUT CO, P1, DOI [10.23919/IConAC.2017.8082057, DOI 10.23919/ICONAC.2017.8082057]
[4]
Alkhatib Sami, 2019, Stud Health Technol Inform, V266, P7, DOI 10.3233/SHTI190765
[5]
AlOtaibi N., 2021, INT C WOM DAT SCI TA, V2021, P1
[6]
Towards a Unified Trust Framework for Detecting IoT Device Attacks in Smart Homes
[J].
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020),
2020,
:613-621
[7]
[Anonymous], 2021, The Product Security and Telecommunications Infrastructure (PSTI) Bill-Product security Factsheet
[8]
[Anonymous], 2012, CBC News