Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference44 articles.
1. Al-Sudania, A. R., Zhoub, W., Liuc, B., Almansoorid, A., & Yange, M. (2018). Detecting unauthorized RFID tag carrier for secure access control to a smart building. International Journal of Applied Engineering Research, 13(1), 749–760.
2. Asadullah, M., & Raza, A. (2016). An overview of home automation systems. In 2016 2nd international conference on robotics and artificial intelligence (ICRAI) (pp. 27–31). https://doi.org/10.1109/ICRAI.2016.7791223.
3. Benkhelifa, E., Welsh, T., & Hamouda, W. (2018). A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Communications Surveys and Tutorials, 20(4), 3496–3509.
4. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys and Tutorials, 18(2), 1153–1176.
5. Chahid, Y., Benabdellah, M., & Azizi, A. (2017). Internet of things security. In 2017 International conference on wireless technologies, embedded and intelligent systems (WITS), IEEE (pp. 1–6).
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献