共 24 条
- [1] Andova S., 2002, PROBABILISTIC PROCES
- [2] [Anonymous], HULK WEB SERVER TOOL
- [3] Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems [J]. SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 224 - 233
- [4] Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
- [5] Network Anomaly Detection: Methods, Systems and Tools [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
- [6] Böhme R, 2010, LECT NOTES COMPUT SC, V6442, P21, DOI 10.1007/978-3-642-17197-0_2
- [7] Buennemeyer TK, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON PORTABLE INFORMATION DEVICES, P27
- [8] Farnell element14, 2017, FARNELL ELEMENT14 CA
- [9] Fruth M., 2011, FORMAL METHODS ANAL
- [10] Internet of Things (IoT): A vision, architectural elements, and future directions [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660