共 80 条
- [1] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
- [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
- [3] Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
- [4] Anantvalee T, 2007, SIGNALS COMMUN TECHN, P159, DOI 10.1007/978-0-387-33112-6_7
- [5] [Anonymous], 2014, MQTT Version 3.1.1
- [6] [Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
- [7] [Anonymous], 2014, RFC 7252, DOI [DOI 10.17487/RFC7252, 10.17487/RFC7252]
- [8] [Anonymous], ANAL 1999 DARPA LINC
- [9] [Anonymous], 2014, Advanced Technologies, Embedded and Multimedia for Human-centric Computing
- [10] [Anonymous], 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2512494, DOI 10.1145/2508859.2512494]