共 189 条
[31]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[32]
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2020, 22 (01)
:616-644
[33]
Cardenas E. D., 2003, MAC SPOOFING AN INTR
[34]
Cauquil D, 2016, P DEF CON 24 INT THI, P4
[35]
A Survey on Wireless Body Area Networks: Technologies and Design Challenges
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2014, 16 (03)
:1635-1657
[36]
Cekerevac Z., 2017, MEST Journal, V5, P15
[37]
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile
[J].
PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19),
2019,
:24-31
[38]
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
[J].
IEEE ACCESS,
2018, 6
:24639-24649
[39]
A User-Friendly Privacy Framework for Users to Achieve Consents With Near by BLE Devices
[J].
IEEE ACCESS,
2018, 6
:20779-20787
[40]
Cha SC, 2016, 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS