共 50 条
- [1] Hierarchical and On-Demand Attack Defence Framework for IoT Devices [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [2] Resource-aware Security Configuration for Constrained IoT Devices [J]. PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 7 - 14
- [3] Bootstrapping security configuration for IoT devices on networks with TLS inspection [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
- [5] Towards Labeling On-Demand IoT Traffic [J]. PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, : 49 - 57
- [6] MODE: A Context-aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices [J]. 2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2017, : 81 - 88
- [7] Physical layer security for IoT devices configuration and key management - a Proof of Concept [J]. 2016 AEIT INTERNATIONAL ANNUAL CONFERENCE (AEIT) - SUSTAINABLE DEVELOPMENT IN THE MEDITERRANEAN AREA: ENERGY AND ICT NETWORKS OF THE FUTURE, 2016,
- [9] Towards On-Demand Resource Provisioning for IoT Environments [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT II, 2015, 9012 : 484 - 493
- [10] A Security Service on-demand Architecture in SDN [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 287 - 291