共 50 条
- [41] Securing private wireless sensors in a shared environment in the internet of things context PROCEEDINGS OF THE 4TH EDITION OF NATIONAL SECURITY DAYS (JNS4), 2014, : 10 - 15
- [42] DeadBolt: Securing IoT Deployments PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 50 - 57
- [43] Securing the Internet of Things (IoT) 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
- [44] Securing SQL Injection flaw BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 65 - 74
- [45] REMARKS TO THE WEB APPLICATIONS SECURING GEOCONFERENCE ON INFORMATICS, GEOINFORMATICS AND REMOTE SENSING - CONFERENCE PROCEEDINGS, VOL I, 2013, : 213 - 218
- [46] Challenges to Securing the Internet of Things 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 1 - 8
- [50] Addressing the Challenges in Securing the Cloud INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1467 - 1476