Author:
Li Xixing,Wei Qiang,Wu Zehui,Guo Wei,He Linhao
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference44 articles.
1. Nadir, I., Mahmood, H., & Asadullah, G. (2022). A taxonomy of IoT firmware security and principal firmware analysis techniques. International Journal of Critical Infrastructure Protection. https://doi.org/10.1016/j.ijcip.2022.100552
2. Trendmicro, “Mirai Botnet Attack IoT Devices via CVE-2020–5902,” 2020. Accessed: Apr. 28, 2022. [Online]. Available: https://www.trendmicro.com/en_us/research/20/g/mirai-botnet-attack-iot-devices-via-cve-2020-5902.html
3. Kelly, C., Pitropakis, N., McKeown, S., and Lambrinoudakis, C. (2020) “Testing And Hardening IoT Devices Against the Mirai Botnet,” in 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–8. https://doi.org/10.1109/CyberSecurity49315.2020.9138887.
4. Qadir, Z., Le, K. N., Saeed, N., & Munawar, H. S. (2023). Towards 6G internet of things: Recent advances, use cases, and open challenges. ICT Express, 9(3), 296–312. https://doi.org/10.1016/j.icte.2022.06.006
5. Nguyen, V.-L., Lin, P.-C., Cheng, B.-C., Hwang, R.-H., & Lin, Y.-D. (2021). Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials 23(4), 2384–2428. https://doi.org/10.1109/COMST.2021.3108618