共 8 条
[1]
[Anonymous], 2017, CISC 2017 MID CYB RE
[2]
Dhanjani N., 2015, ABUSING INTERNET THI
[3]
Security Analysis of Emerging Smart Home Applications
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:636-654
[4]
Hamza A., P 2018 WORKSH IOT SE, P1
[5]
Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity
[J].
SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH,
2019,
:36-48
[6]
Systematically Evaluating Security and Privacy for Consumer IoT Devices
[J].
PROCEEDINGS OF THE 2017 WORKSHOP ON INTERNET OF THINGS SECURITY AND PRIVACY (IOT S&P'17),
2017,
:1-6
[7]
Sivanathan A., P 2017 IEEE INT C AD, P1