共 24 条
- [1] Andalibi V., 2019, 2 USENIX WORKSH HOT
- [2] Andalibi Vafa, 2021, 5 EAI INT C SAF SEC
- [3] A Survey of Botnet Technology and Defenses [J]. CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 299 - +
- [4] Brooke J., 1996, Usability Evaluation in Industry, V189, P4, DOI [DOI 10.1201/9781498710411-35, 10.1201/9781498710411-35]
- [5] Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 524 - 535
- [6] Dodson Donna, 2019, Technical Report
- [7] Erbenich V.I.P., 2019, HAISA, P179
- [8] Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles [J]. PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, : 8 - 14