Author:
Aborujilah Abdulaziz,Nassr Rasheed Mohammad,Al-Hadhrami Tawfik,Husen Mohd Nizam,Ali Nor Azlina,Al-Othmani AbdulAleem,Syahela Nur,Ochiai Hideya
Publisher
Springer International Publishing
Reference16 articles.
1. Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutorials 17(4), 2242–2270 (2015)
2. Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)
3. Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circ. Syst. 3(1), 45–54 (2013)
4. Kinney, P.: Zigbee technology: wireless control that simply works. Commun. Des. Conf. 2, 1–7 (2003)
5. Durkota, K., Lisý, V., Bošanský, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献