共 67 条
[1]
Identifying cyber threats to mobile-loT applications in edge computing paradigm
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 89
:525-538
[2]
[Anonymous], 2016, Verizon Data Breach Investigations Report
[3]
[Anonymous], USC ISI ANT DATASETS
[4]
[Anonymous], ANN WORKSH EC INF SE
[5]
[Anonymous], COMPUT SECUR
[6]
[Anonymous], 2013, HIDDEN LYNX PROFESSI
[7]
[Anonymous], CYB SEC MALW PROT
[8]
[Anonymous], PREVENT PHISHING ATT
[9]
[Anonymous], THESIS
[10]
[Anonymous], POS RAM SCRAPER MALW