共 51 条
- [1] Hussain S(2014)Threat modelling methodologies: a survey Sci. Int. 26 1607-61
- [2] Kamal A(2011)A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requir. Eng. 16 3-114
- [3] Ahmad S(2007)Model-based security analysis in seven steps—a guided tour to the CORAS method BT Technol. J. 25 101-26
- [4] Rasool G(2007)Threat modeling using fuzzy logic paradigm Informing Sci. Int. J. Emerg. Transdiscipl. 4 53-undefined
- [5] Iqbal S(2016)A comprehensive study of security of Internet-of-Things IEEE Trans. Emerg. Top. Comput. 5 1-undefined
- [6] Deng M(2009)That ‘internet of things’ thing RFID J. 22 97-undefined
- [7] Wuyts K(2013)Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener. Comput. Syst. 29 1645-undefined
- [8] Scandariato R(2009)A survey on Wireless Sensor Network security Comput. Netw. 1 55-undefined
- [9] Preneel B(2014)A Survey on Internet of Things: Security and Privacy Issues International Journal of Computer Applications 90 20-undefined
- [10] Joosen W(2016)Secure routing for internet of things: a survey J. Netw. Comput. Appl. 66 198-undefined