共 50 条
[21]
Capkun S, 2005, IEEE INFOCOM SER, P1917
[22]
Celler B., 2016, AUSTR HLTH RES CTR A
[24]
Chinaei M. H., 2020, WITNESSING SMART CON
[25]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232
[26]
Towards fog-driven IoT eHealth: Promises and challenges of loT in medicine and healthcare
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:659-676
[27]
Combining MUD Policies with SDN for IoT Intrusion Detection
[J].
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18),
2018,
:1-7
[28]
Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity
[J].
SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH,
2019,
:36-48