共 50 条
- [31] Security Threats among DICOM Imaging Communications in Public Networks [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (06): : 241 - 250
- [32] Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions [J]. IEEE ACCESS, 2022, 10 : 97197 - 97216
- [33] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J]. IEEE ACCESS, 2019, 7 : 82721 - 82743
- [34] AN ADAPTIVE SECURITY ARCHITECTURE FOR FUTURE AIRCRAFT COMMUNICATIONS [J]. 29TH DIGITAL AVIONICS SYSTEMS CONFERENCE: IMPROVING OUR ENVIRONMENT THROUGH GREEN AVIONICS AND ATM SOLUTIONS, 2010,
- [35] Security measures in a secure computer communications architecture [J]. 2006 IEEE/AIAA 25TH DIGITAL AVIONICS SYSTEMS CONFERENCE, VOLS 1- 3, 2006, : 1078 - 1095
- [37] Security Requirements in a Federated Cloud Networking Architecture [J]. ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
- [38] Security Architecture and Requirements for Wireless Sensor Networks [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
- [39] Cloud Security: A Review of Recent Threats and Solution Models [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 115 - 123
- [40] Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications [J]. BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN AND ROBOTIC PROCESS AUTOMATION FORUM, BPM 2021 BLOCKCHAIN AND RPA FORUM, 2021, 428 : 67 - 84