Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference137 articles.
1. Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl (IJACSA) 9(3):355–373
2. Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks and defenses. In: 2017 International Conference on Communication Technologies (ComTech), pages 104–110. IEEE
3. Ahlawat B, Sangwan A, Sindhu V. IoT system model, challenges and threats
4. Firoz A, Young-Bae K (2016) Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Networks 9(18):5143–5154
5. Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: security challenges, security requirements and solutions. In: 2017 23rd International Conference on Automation and Computing (ICAC), pages 1–6. IEEE
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献