共 44 条
- [31] Patel Chintan, 2020, Procedia Computer Science, V171, P1399, DOI 10.1016/j.procs.2020.04.150
- [32] Prasad R., 2020, CYBER SECURITY LIFEL, P125, DOI [10.1007/978-3-030-31703-4_9, DOI 10.1007/978-3-030-31703-4_9]
- [33] OPC UA versus ROS, DDS, and MQTT: Performance Evaluation of Industry 4.0 Protocols [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 955 - 962
- [35] Rahmandita A, 2018, INT CONF ICT SMART S, P1
- [36] Security Analysis of the MQTT-SN Protocol for the Internet of Things [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
- [37] Rubow B., 2017, SECS GEM SECS GEM FE
- [38] Analysis of a denial of service attack on TCP [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 208 - 223
- [39] Authentication of IoT Device and IoT Server Using Secure Vaults [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 819 - 824
- [40] Stoop Fabian, 2019, International Journal of Mechatronics and Manufacturing Systems, V12, P344