共 50 条
- [1] ARMOUR: Large-Scale Experiments for IoT Security & Trust [J]. 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 553 - 558
- [3] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments [J]. UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
- [4] Data Security Storage Model for Fog Computing in Large-Scale IoT Application [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 39 - 44
- [6] LEONORE - Large-Scale Provisioning of Resource-Constrained IoT Deployments [J]. 9TH IEEE INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2015), 2015, : 78 - 87
- [7] MONICA in Hamburg: Towards Large-Scale IoT Deployments in a Smart City [J]. 2018 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2018, : 224 - 229
- [8] Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices [J]. JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2019, 6 (03): : 157 - 161
- [9] SoK: Security Evaluation of Home-Based IoT Deployments [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
- [10] An Improved Spread Factor Assignment Method for Large-Scale LoRaWAN Deployments in IoT [J]. 2018 4TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2018, : 183 - 187