共 33 条
[1]
Real time dataset generation framework for intrusion detection systems in IoT
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 108
:414-423
[3]
Al-Othman Z, 2020, Arxiv, DOI arXiv:2010.13852
[4]
Systematic Literature Review on IoT-Based Botnet Attack
[J].
IEEE ACCESS,
2020, 8
:212220-212232
[5]
[Anonymous], WIRESHARK DOWNLOAD
[6]
Awadelkarim Mohamed A.M., 2020, 2020 International Conference on Computing and Information Technology, ICCIT 2020, DOI [10.1109/iccit-144147971.2020.9213715, DOI 10.1109/ICCIT144147971.2020.9213715]
[7]
Benesty J., 2009, Dictionary of pharmaceutical medicine, P1
[8]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[9]
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (05)
[10]
Patro SGK, 2015, Arxiv, DOI [arXiv:1503.06462, DOI 10.17148/IARJSET.2015.2305]