Author:
Wang Ni,Yu Hongbo,Guo Zhongwen,Lei Hongmei
Publisher
Springer Nature Switzerland
Reference13 articles.
1. Vijayakumar, K., Arun, C.: Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Clust. Comput. 22(3), 1–12 (2019)
2. Zhu, X., Li, Q., Chen, Z., et al.: Research on security detection technology for internet of things terminal based on firmware code genes. IEEE Access PP(99), 1–1 (2020)
3. Chen, C., Ma, J., Qi, T., et al.: Firmware code instrumentation technology for internet of things-based services. World Wide Web 1–14 (2020)
4. Zandberg, K., Schleiser, K., Acosta, F., et al.: Secure firmware updates for constrained IoT devices using open standards: a reality check. IEEE Access 7, 71907–71920 (2019)
5. Hernandez, G., Fowze, F., Tang, D.J., et al.: Toward automated firmware analysis in the IoT era. IEEE Secur. Priv. 17(5), 38–46 (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献