共 57 条
[21]
Hussain M. I., 2017, CSI Trans. ICT, V5, P87, DOI [10.1007/s40012-016-0136-6, DOI 10.1007/S40012-016-0136-6]
[23]
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
[J].
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015),
2015, 48
:338-346
[25]
Kumar N, 2016, INT C SOFT COMP PATT, P262
[26]
Le Anhtuan, 2013, 2013 IEEE Symposium on Computers and Communications (ISCC), P000789, DOI 10.1109/ISCC.2013.6755045
[28]
MAYZAUD A., 2016, A Taxonomy of Attacks in RPL-based Internet of Things
[29]
Internet of Things: information security challenges and solutions
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2019, 22 (01)
:103-119