Author:
Wang Aohui,Liang Ruigang,Liu Xiaokang,Zhang Yingjun,Chen Kai,Li Jin
Publisher
Springer International Publishing
Reference31 articles.
1. Symantec blog. https://www.symantec.com/connect/blogs/iot-devices-being-increasingly-used-ddos-attacks
2. Jing, Q., Vasilakos, A.V., Wan, J., et al.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)
3. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE (2014)
4. Inside the Internet of Things village at DefCon. http://www.businessinsider.com/iot-village-defcon-2016-8
5. Chen, K., Wang, P., Lee, Y., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-Play scale. In: USENIX Security, vol. 15 (2015)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献