共 44 条
[31]
Patel Chintan, 2020, Procedia Computer Science, V171, P1399, DOI 10.1016/j.procs.2020.04.150
[32]
Prasad R., 2020, CYBER SECURITY LIFEL, P125, DOI DOI 10.1007/978-3-030-31703-4_9
[33]
OPC UA versus ROS, DDS, and MQTT: Performance Evaluation of Industry 4.0 Protocols
[J].
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT),
2019,
:955-962
[35]
Rahmandita A, 2018, INT CONF ICT SMART S, P1
[36]
Security Analysis of the MQTT-SN Protocol for the Internet of Things
[J].
APPLIED SCIENCES-BASEL,
2022, 12 (21)
[37]
Rubow B., 2017, SECS GEM SECS GEM FE
[38]
Analysis of a denial of service attack on TCP
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:208-223
[39]
Authentication of IoT Device and IoT Server Using Secure Vaults
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:819-824
[40]
Stoop Fabian, 2019, International Journal of Mechatronics and Manufacturing Systems, V12, P344