Author:
Hemmes Jeffrey,Dressler Judson,Fulton Steven
Publisher
Springer International Publishing
Reference23 articles.
1. Anderson, B., McGrew, D.: OS fingerprinting: new techniques and a study of information gain and obfuscation. In: IEEE Conference on Communication and Network Security (CNS), Las Vegas, NV, pp. 1–9 (2017)
2. Bakar, K., Daud, N., Hasan, M.: Adaptive authentication: a case study for unified authentication platform. In: World Congress on Computer and Information Technology (WCCIT 2013), pp. 1–6 (2013).
3. Bao, F., Chen, I.: Dynamic trust management for internet of things applications. In: 2012 International Workshop on Self-Aware Internet of Things (Self-IoT 2012), San Jose, pp. 1–6 (2012)
4. Contiki: The Open Source OS for the Internet of Things. https://www.contiki-os.org
5. Gu, T., Mohapatra, P.: BF-IoT: securing the IoT networks via fingerprinting-based device authentication. In: 15th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Chengdu (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献