共 146 条
[1]
Abomhara M., 2015, Journal of Cyber Security and Mobility, V4, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
[2]
Adhikary, 2019, INT C INT COMP COMM
[3]
Ahmed Z, 2019, IEEE INT WORKSH COMP, DOI [10.1109/SCCS.2019.8852596, 10.1109/camad.2019.8858484]
[5]
IoT and the Risk of Internet Exposure: Risk Assessment using Shodan Queries
[J].
2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM),
2019,
[6]
AlHammadi A., 2019, 2019 28th IEEE International Conference on Robot and Human Interactive Communication, P1
[7]
Scalable Analysis of Interaction Threats in IoT Systems
[J].
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020,
2020,
:272-285
[8]
Alhasnawi B., 2020, J XIAN U ARCHIT, V63, P1006
[9]
[Anonymous], 2001, Report No.: DTRT00101
[10]
Arcenegui J, 2020, INT C APPL CRYPT NET