共 51 条
[1]
Abd Ellah AR, 2015, 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), P384, DOI 10.1109/ICCES.2015.7393080
[2]
Abraham A., 2001, Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence. 6th International Work-Conference on Artificial and Natural Neural Networks, IWANN 2001. Proceedings, Part I (Lecture Notes in Computer Science Vol. 2084), P269
[3]
Abraham A., 2005, HDB MEASURING SYSTEM, P97
[5]
Asogbon M.G., 2016, INT J INTELL INF SYS, V5, P17
[8]
Developing an adaptive Risk-based access control model for the Internet of Things
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA),
2017,
:655-661
[9]
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things
[J].
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY,
2017,
:254-260
[10]
Beinarovica A., 2017, IOP C SERIES MAT SCI, V236, P1