共 22 条
[2]
Alshahrani R., 2018, 2018 IEEE Global Communications, P1
[4]
Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2020, 65 (01)
:87-107
[5]
Bordel B, 2019, INTELL AUTOM SOFT CO, V25, P155
[6]
Dhanabal L., 2015, Int. J. Adv. Res. Comput. Commun. Eng., V4, P446
[8]
Ingre B, 2015, 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), P92, DOI 10.1109/SPACES.2015.7058223
[9]
Data Fusion-Based Machine Learning Architecture for Intrusion Detection
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2022, 70 (02)
:3399-3413
[10]
Khan MA, 2021, IEEE NETWORK, V35, P223, DOI [10.1109/MNET.011.2000530, 10.1109/MNET.011.2000514]