共 50 条
- [33] Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (02): : 153 - 158
- [34] Low Power Routing and Channel Allocation Method of Wireless Video Sensor Networks for Internet of Things (IoT) [J]. 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 446 - 451
- [35] Anatomy of Threats to the Internet of Things [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1636 - 1675
- [37] Internet of Things Vulnerabilities in Military Environments [J]. VOJENSKE ROZHLEDY-CZECH MILITARY REVIEW, 2021, 30 (03): : 45 - 58
- [38] IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 123 - 129
- [39] An Investigation of Vulnerabilities in Internet of Health Things [J]. COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 296 - 306
- [40] SysSec: Managing threats and Vulnerabilities in the future Internet [J]. ERCIM NEWS, 2012, (90): : 13 - 14