共 46 条
[1]
Abo Emira H.H., 2021, J CYBERSECUR INF MAN, V1, P35, DOI [10.54216/jcim.010202, DOI 10.54216/JCIM.010202]
[2]
Aich S, 2018, INT CONF ADV COMMUN, P638, DOI 10.23919/ICACT.2018.8323864
[4]
A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory
[J].
IEEE ACCESS,
2018, 6
:47364-47373
[6]
Apriani Mega, 2020, 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI), P54, DOI 10.23919/EECSI50503.2020.9251877
[7]
A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain
[J].
IEEE NETWORK,
2020, 34 (05)
:78-83
[8]
Dadhich P., 2020, In: Machine Learning with Health Care Perspective, P183
[10]
Foytik P., 2020, P IEEE SPRING SIM C, P1, DOI [10.5555/3408207.3408236, DOI 10.5555/3408207.3408236]