共 18 条
[2]
Alharby S., 2018, INT J ELECT COMMUNIC, V12, P9, DOI DOI 10.5281/ZENODO.1315561
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Chinchani R, 2006, LECT NOTES COMPUT SC, V3858, P284
[6]
My Smart Home is Under Attack
[J].
2015 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE),
2015,
:145-151
[9]
서화정, 2012, Journal of Information and Communication Convergence Engineering, V10, P343, DOI 10.6109/jicce.2012.10.4.343
[10]
Kalis - A System for Knowledge-driven Adaptable Intrusion Detection for the Internet of Things
[J].
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017),
2017,
:656-666