共 6 条
[2]
Forbis S., 2015, INTEGRATION ZMAP SHO
[3]
Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT)
[J].
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC),
2014,
:232-235
[4]
Radvanosky R., 2015, 10 SANS ICS SEC SUMM
[5]
Vulnerability Analysis Using Google and Shodan
[J].
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016,
2016, 10052
:725-730
[6]
Williams P. M., 2014, AFITENGT14J41 WRIGHT