共 102 条
- [1] Aafer Y, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2759
- [2] A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J]. JOURNAL OF CYBERSECURITY, 2018, 4 (01):
- [3] Ali W., 2017, 2017 23 INT C AUT CO, P1, DOI DOI 10.23919/ICONAC.2017.8082057
- [4] Alkhatib Sami, 2019, Stud Health Technol Inform, V266, P7, DOI 10.3233/SHTI190765
- [5] AlOtaibi N., 2021, INT C WOM DAT SCI TA, V2021, P1
- [6] Towards a Unified Trust Framework for Detecting IoT Device Attacks in Smart Homes [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 613 - 621
- [7] [Anonymous], 2021, The Product Security and Telecommunications Infrastructure (PSTI) Bill-Product security Factsheet
- [8] [Anonymous], 2019, CBC News
- [10] EclipseloT: A secure and adaptive hub for the Internet of Things [J]. COMPUTERS & SECURITY, 2018, 78 : 477 - 490