共 55 条
[21]
Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers
[J].
HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS,
2016,
:99-104
[22]
Machine Learning DDoS Detection for Consumer Internet of Things Devices
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:29-35
[24]
Forbes, 2019, U.K. to introduce new law for IoT device security
[25]
iTeleScope: Softwarized Network Middle-Box for Real-Time Video Telemetry and Classification
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2019, 16 (03)
:1071-1085
[26]
Internet of Things (IoT): A vision, architectural elements, and future directions
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (07)
:1645-1660
[27]
Hall M.A., 1998, CORRELATION BASED FE
[28]
Combining MUD Policies with SDN for IoT Intrusion Detection
[J].
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18),
2018,
:1-7
[29]
Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity
[J].
SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH,
2019,
:36-48
[30]
Deep Compositional Captioning: Describing Novel Object Categories without Paired Training Data
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:1-10