共 39 条
[1]
Abbas MA, 2018, PROCEEDINGS OF 2018 FIRST INTERNATIONAL WORKSHOP ON DEEP AND REPRESENTATION LEARNING (IWDRL), P13, DOI 10.1109/IWDRL.2018.8358209
[3]
Ariu D., 2011, AISEC 11
[6]
Chatterjee M., 2014, P 57 IISL C LAW OUTE, P1
[7]
Chen YY, 2011, IEEE INFOCOM SER, P1620, DOI 10.1109/INFCOM.2011.5934955
[8]
Internet of Things security and forensics: Challenges and opportunities
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:544-546
[9]
Distributed attack detection scheme using deep learning approach for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 82
:761-768
[10]
Guarino A., 2013, ISSE 2013 securing electronic business processes, P197, DOI [10.1007/978-3-658-03371-2_17, DOI 10.1007/978-3-658-03371-2_17]