Author:
Zhang Shijun,Li Shuo,Zeng Jing
Reference11 articles.
1. Mukherjee, A.: Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015)
2. Tai, W.L., Chang Y.F., Lo, Y.L.: An anonymity, availability and security-ensured authentication model of the IoT control system for reliable and anonymous eHealth services. J. Med. Biol. Eng. (2018)
3. Peng, Y., et al.: Sensing network security prevention measures of BIM smart operation and maintenance system. Comput. Commun. 161 (2020)
4. Li, Q., Zhang, L., Zhou, R., et al.: Machine learning-based stealing attack of the temperature monitoring system for the energy internet of things. Secur. Commun. Netw. 2021(11), 1–8 (2021)
5. Blessy, R.: A survey on network security attacks and prevention mechanism. J. Curr. Comput. Sci. Technol. (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献