共 30 条
[1]
[Anonymous], 2015, IEEE STANDARD LOW RA
[2]
[Anonymous], 2017, 2017 GLOBAL INTERNET, DOI DOI 10.1109/GIOTS.2017.8016285
[3]
Internet of Things as a Methodological Concept
[J].
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING FOR GEOSPATIAL RESEARCH AND APPLICATION (COM.GEO),
2013,
:48-55
[5]
Security Monitoring in the Cloud: an SLA-based approach
[J].
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015,
2015,
:749-755
[6]
Cerullo G., 2018, Dans Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, P77, DOI DOI 10.1016/13978-0-12-811373-8.00004-5
[7]
Coppolino Luigi, 2013, Critical Information Infrastructures Security. 7th International Workshop, CRITIS 2012. Revised Selected Papers: LNCS 7722, P10, DOI 10.1007/978-3-642-41485-5_2
[8]
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
[J].
2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013),
2013,
:247-254
[9]
Hui J., 2011, RFC 6282 (Proposed Standard), DOI [10.17487/RFC6282, DOI 10.17487/RFC6282]
[10]
Kirby O., 2007, IEEE 802 15 4 DISSEC