共 52 条
[1]
Al-Hawawreh Muna Sulieman, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P236, DOI 10.1109/ICITECH.2017.8080006
[2]
Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2021, 8 (04)
:2968-2981
[4]
Alexander O., 2020, MITRE ATT&CK for Industrial Control Systems: design and philosophy
[5]
Asert, 2019, COAP ATT WILD
[6]
Bediya Arun Kumar, 2020, 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), P824, DOI 10.1109/GUCON48875.2020.9231139
[7]
Bhatt P, 2018, 2018 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, EMBEDDED SYSTEMS AND COMMUNICATIONS (IINTEC), P191, DOI 10.1109/IINTEC.2018.8695303
[8]
Brown R., 2019, The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey
[9]
CANUTO L, 2019, 2019 14 IB C INF SYS
[10]
Chamola, 2020, IEEE J SEL AREAS COM