共 24 条
[1]
Andalibi V., 2019, 2 USENIX WORKSH HOT
[2]
Andalibi Vafa, 2021, 5 EAI INT C SAF SEC
[3]
A Survey of Botnet Technology and Defenses
[J].
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS,
2009,
:299-+
[4]
Brooke J, 1996, Usability Evaluation in Industry, P189, DOI DOI 10.1201/9781498710411-35/SUS-QUICK-DIRTY-USABILITY-SCALE-JOHN-BROOKE
[6]
Dodson Donna, 2019, Technical Report
[7]
Erbenich V.I.P., 2019, HAISA, P179
[8]
Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles
[J].
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18),
2018,
:8-14