共 25 条
[1]
Abdullah N, 2017, INT CONF UBIQ FUTUR, P887
[2]
Ahram T, 2017, 2017 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT SOCIETY CONFERENCE (TEMSCON), P137, DOI 10.1109/TEMSCON.2017.7998367
[3]
[Anonymous], 2003, CISC VIS NETW IND GL
[4]
Bye R., 2010, P COLLSEC US WORKSH
[6]
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[7]
A trust-aware, P2P-based overlay for intrusion detection
[J].
SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2006,
:692-+
[8]
Golomb T., 2018, Proceedings of the First Workshop on Decentralized IoT Security and Standards (DISS'18), San Diego, CA, USA, February 18, DOI DOI 10.14722/DISS.2018.23003
[9]
Consortium Blockchain-Based Malware Detection in Mobile Devices
[J].
IEEE ACCESS,
2018, 6
:12118-12128
[10]
Igbe O., 2017, 2 INT C SMART CLOUD