Publisher
Springer Nature Singapore
Reference20 articles.
1. Swan M (2012) Sensor mania! The internet of things, wearable computing, objective metrics, and the quantified self 2.0. J Sens Actuator Netw 1(3):217–253
2. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41–49
3. Vandana TS, Ravi KS (2018) A survey overview: on wireless body area network and its various applications. Int J Eng Technol 7(2.7):936
4. Petrenko A, Petrenko S, Makoveichuk K, Chetyrbok P (2018) The IIoT/IoT device control model is based on narrow-band IoT (NB-IoT). In: 2018 IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus)
5. [Online]. Available at: https://blog.cloudflare.com/ddos-attack-trends-for-2022-q1/#:~:text=In%20the%20last%20quarter%2C%202021,YoY%20and%2052%25%20decrease%20QoQ. Accessed 2 May 2022