共 50 条
- [1] MQTT flow signatures for the Internet of Things [J]. 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
- [2] CoAP flow signatures for the Internet of Things [J]. 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
- [3] An Attack Tree Based Risk Evaluation Approach For The Internet of Things [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,
- [4] Hash-based signatures for the Internet of Things [J]. 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
- [6] Defending Against New-Flow Attack in SDN-Based Internet of Things [J]. IEEE ACCESS, 2017, 5 : 3431 - 3443
- [7] A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow [J]. IEEE ACCESS, 2018, 6 : 8599 - 8609
- [9] Security Challenges in the IP-based Internet of Things [J]. Wireless Personal Communications, 2011, 61 : 527 - 542
- [10] Digital Object Architecture as an Approach to Identifying Internet of Things Devices [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2019), 2019, 1141 : 597 - 611