共 50 条
- [21] Modelling an IoT Testbed in Context with the Security Vulnerabilities of South Africa [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 244 - 248
- [23] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities [J]. 2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 373 - 384
- [24] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
- [25] Security Analysis of Existing IoT Key Management Protocols [J]. 2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
- [26] Security of IoT Application Layer Protocols: Challenges and Findings [J]. FUTURE INTERNET, 2020, 12 (03):
- [27] Impact of Duty Cycle Protocols on Security Cost of IoT [J]. 2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2018, : 25 - 30
- [28] A REVIEW OF DIFFERENT VULNERABILITIES OF SECURITY IN A LAYERED NETWORK [J]. ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2020, 20 (02): : 227 - 236