Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Alaslani M, Nawab F, Shihada B (2019) Blockchain in IoT systems: end-to-end delay evaluation. IEEE Internet Things J 6(5):8332–8344. https://doi.org/10.1109/JIOT.2019.2917226
2. Al-Garage MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv Tutor 22(3):1646–1685. https://doi.org/10.1109/COMST.2020.2988293. (third quarter)
3. Alkhresheh, Elgazzar K, Hassanein HS (2020) DACIoT: dynamic access control framework for IoT deployments. IEEE Internet Things J 7(12):11401–11419. https://doi.org/10.1109/JIOT.2020.3002709
4. Andrade RO, Yoo SG, Tello-Oquendo L, Ortiz-Garcés I (2020) A comprehensive study of the IoT cybersecurity in smart cities. IEEE Access 8:228922–228941. https://doi.org/10.1109/ACCESS.2020.3046442
5. Docs.microsoft.com (2021) Enterprise-grade conversational bot - Azure Architecture Center. https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/ai/conversational-bot. (Accessed 2 Aug 2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evolving Threat Landscape in IoT and IIoT Environments;Advances in Information Security, Privacy, and Ethics;2024-06-30