共 50 条
- [31] Automated Security Analysis for Real-World IoT Devices [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 29 - 37
- [32] Poster Abstract: Analysis of Cyber-Security Vulnerabilities of Interconnected Medical Devices [J]. 2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 23 - 24
- [33] Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices [J]. APPLIED SCIENCES-BASEL, 2022, 12 (06):
- [34] Static analysis for discovering IoT vulnerabilities [J]. International Journal on Software Tools for Technology Transfer, 2021, 23 : 71 - 88
- [35] Modelling an IoT Testbed in Context with the Security Vulnerabilities of South Africa [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 244 - 248
- [36] Analysis of Security Vulnerabilities and Countermeasures [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
- [37] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
- [39] An analysis of Bluetooth security vulnerabilities [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831