共 15 条
- [1] Aksoy A, 2019, IEEE ICC
- [2] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
- [3] SoK: Security Evaluation of Home-Based IoT Deployments [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
- [4] [Anonymous], 2019, IOT MARKET SIZE GROW
- [5] Behavioral Fingerprinting of IoT Devices [J]. PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 41 - 50
- [6] IoT Device Identification via Network-Flow Based Fingerprinting and Learning [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 103 - 111
- [7] Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity [J]. SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, : 36 - 48
- [8] Machine Learning in IoT Security: Current Solutions and Future Challenges [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1686 - 1721
- [9] An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level [J]. APPLIED SCIENCES-BASEL, 2019, 9 (16):