共 72 条
- [1] Abdul-Ghani HA(2018)A comprehensive IoT attacks survey based on a building-blocked reference model Int J Adv Comput Sci Appl (IJACSA) 9 355-373
- [2] Konstantas D(2016)Mitigation of black hole attacks in routing protocol for low power and lossy networks Secur Commun Networks 9 5143-5154
- [3] Mahyoub M(2018)A detection and prevention technique for man in the middle attack in fog computing Procedia Comput Sci 141 24-31
- [4] Firoz A(2019)A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) Wirel Networks 25 3193-3204
- [5] Young-Bae K(2012)Stuxnet: What has changed? Futur Internet 4 672-687
- [6] Farouq A(2019)An adaptive resource allocation model with anti-jamming in IoT network IEEE Access 7 93250-93258
- [7] Tarek S(2018)Security and privacy in wireless IoT IEEE Wirel Commun 25 10-11
- [8] Shakshuki EM(2019)A decentralized privacy-preserving healthcare blockchain for IoT Sensors 19 326-132
- [9] Almusaylim ZA(2018)Intrusion detection systems for IoT-based smart environments: a survey J Cloud Comput 7 21-267
- [10] Noor Z(2011)The internet of things: how the next evolution of the internet is changing everything Cisco Int J Internet 3 123-82743