Publisher
Springer Science and Business Media LLC
Reference156 articles.
1. Annual number of internet of things (IoT) malware attacks worldwide from 2018 to 2022, (2023). Accessed on 2023-10-20. Available at https://www.statista.com/statistics/1377569/worldwide-annual-internet-of-things-attacks/
2. R. 2016. Hypertext transfer protocol – http/1.1. Available at https://www.ietf.org/rfc/rfc2616.txt, (1999). Accessed on 2023-10-19
3. Aazam, M., Zeadally, S., Harras, K.A.: Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans. Ind. Inf. 14(10), 4674–4682 (2018)
4. Abbasi, M., Plaza-Hernández, M., Prieto, J., Corchado, J.M.: Security in the internet of things application layer: requirements, threats, and solutions. IEEE Access 10, 97197–97216 (2022)
5. Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., Liu, X.: Blockchain-based identity and authentication scheme for MQTT protocol. In: 2021 The 3rd International Conference on Blockchain Technology, pages 73–81 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献