Author:
Shen Yi,Zhang Yuhan,Li Yuwei,Ding Wanmeng,Hu Miao,Li Yang,Huang Cheng,Wang Jie
Publisher
Springer Nature Switzerland
Reference31 articles.
1. Riad, K., Huang, T., Ke, L.: A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 160, 102633 (2020)
2. Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515–526 (2015)
3. Stergiou, C.L., Psannis, K.E., Gupta, B.B.: IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J. 8(7), 5164–5171 (2020)
4. Kolias, C., et al.: DDoS in the IoT: mirai and other botnets. Computer 50(7), 80–84 (2017)
5. Wodecki, N.: Zscaler Study Confirms IoT Devices are a Major Source of Security Compromise, Reinforces Need for Zero Trust Security. Web (2021). https://www.globenewswire.com