共 58 条
[1]
Abdul-Ghani HA(2018)A comprehensive IoT attacks survey based on a building-blocked reference model Int J Adv Comput Sci Appl 9 3-286
[2]
Konstantas D(2020)A study of frozen iteratively regularized Gauss–newton algorithm for nonlinear ill-posed problems under generalized normal solvability conditions J Inverse Ill-Posed Problems 28 275-648
[3]
Mahyoub M(2020)Dynamic input reconstruction algorithm for a nonlinear equation with distributed parameters Differ Equations 56 641-1683
[4]
Bakushinsky A(2018)A survey on security control and attack detection for industrial cyber-physical systems Neurocomputing 275 1674-87578
[5]
Smirnova A(2021)SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT IEEE Access 9 87563-180
[6]
Blizorukova MS(2019)System architecture and key technologies of network security situation awareness system Yhsas Comput Mater Continua 59 167-82743
[7]
Maksimov VI(2019)A survey on IoT security: application areas, security threats, and solution architectures IEEE Access 7 82721-6018
[8]
Ding D(2020)Modified backstepping algorithm with disturbance compensation for nonlinear mimo systems IFAC-PapersOnLine 53 6012-3074
[9]
Han QL(2021)Secure access control for manufacturing sector with application of ethereum blockchain Peer-to-Peer Netw Appl 14 3058-708
[10]
Xiang Y(2021)Preserving health care data security and privacy using Carmichael’s theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems Big Data 21 699-25