共 50 条
- [22] Security vulnerabilities in DNS and DNSSEC ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 335 - +
- [23] Investigation on Security Risk of LoRaWAN: Compatibility Scenarios IEEE ACCESS, 2022, 10 : 101825 - 101843
- [24] An analysis of Bluetooth security vulnerabilities WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
- [25] Analysis of Security Vulnerabilities and Countermeasures INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
- [26] An Investigation of Bluetooth Security Vulnerabilities 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
- [27] Security Vulnerabilities of Autonomous Platoons 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
- [29] Demonstrating vulnerabilities in Bluetooth security GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1420 - 1424
- [30] Analysis of LoRaWAN v1.1 Security PROCEEDINGS OF THE 4TH ACM MOBIHOC WORKSHOP ON EXPERIENCES WITH THE DESIGN AND IMPLEMENTATION OF SMART OBJECTS: SMARTOBJECTS'18, 2018,