共 31 条
- [1] IoT Security: A review of vulnerabilities and security protocols [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
- [2] IoT Networks: Security Vulnerabilities of Application Layer Protocols [J]. 2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
- [3] Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles [J]. IEEE ACCESS, 2021, 9 : 46927 - 46948
- [4] A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2016, 2016, 10009 : 141 - 158
- [5] Identifying Security Vulnerabilities of Weakly Detectable Network Parameter Errors [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 295 - 301
- [6] Identifying and Measuring Security Critical Path for Uncovering Circuit Vulnerabilities [J]. 2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017, : 62 - 67
- [9] Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols [J]. Journal of Computer Science and Technology, 2010, 25 : 375 - 387
- [10] Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art [J]. ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,