共 50 条
- [41] IoT Attacks: Features Identification and Clustering 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 353 - 360
- [43] Acoustic Attacks in the Era of IoT - A Survey PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 855 - 858
- [45] Performance Analysis of Healthcare Processes through Process Mining ERCIM NEWS, 2012, (89): : 18 - 19
- [46] Applications of quantitative process mineralogy through the mining cycle AUSIMM'98: THE MINING CYCLE, 1998, 98 (02): : 333 - 337
- [47] Knowledge discovery through mining process operational data APPLICATION OF NEURAL NETWORKS AND OTHER LEARNING TECHNOLOGIES IN PROCESS ENGINEERING, 2001, : 287 - 328
- [48] Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks 2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 407 - 415
- [49] User-Centered and Privacy-Driven Process Mining System Design for IoT INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019, 2019, 350 : 194 - 206