Author:
Kieras Tim,Farooq Junaid,Zhu Quanyan
Publisher
Springer International Publishing
Reference31 articles.
1. J. Farooq, Q. Zhu, Internet of Things-Enabled Systems and Infrastructure (Wiley, 2021), ch. 1, pp. 1–8. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119716112.ch1
2. J. Farooq, Q. Zhu, Resource Management in IoT-Enabled Interdependent Infrastructure (Wiley, 2021), ch. 2, pp. 9–13. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119716112.ch2
3. J. Farooq, Q. Zhu, Network Defense Mechanisms Against Malware Infiltration (Wiley, 2021), ch. 8, pp. 97–124. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119716112.ch8
4. C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)
5. R. Langner, Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49–51 (2011)