共 17 条
[1]
Abdalrahman G. A., 2019, P 2019 7 INT S DIGIT, P1
[2]
Al-Jaroodi Jameela, 2018, ACM SIGBED Review, V15, P29, DOI 10.1145/3292384.3292389
[3]
Alam T, 2018, INT J SCI RES COMPUT, V3
[4]
Anirudh M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), P11
[5]
Babu Parsam Dinesh, 2019, 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), P109, DOI 10.1109/ICONSTEM.2019.8918782
[6]
Denial of Service Attack on IoT System
[J].
2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018),
2018,
:755-758
[7]
Dua Aneesh, 2019, 2019 4th International Conference on Information Systems and Computer Networks (ISCON), P636, DOI 10.1109/ISCON47742.2019.9036313
[8]
Hassanzadeh A, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P795, DOI 10.1109/WF-IoT.2015.7389155
[9]
Imani A, 2018, 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P264, DOI 10.1109/ISTEL.2018.8661044
[10]
Karimullin Kamil, 2019, 2019 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC), DOI 10.1109/CLEOE-EQEC.2019.8871714