Author:
Chen Zitao,Ren Wei,Ren Yi,Choo Kim-Kwang Raymond
Funder
Guizhou Provincial Key Laboratory of Public Big Data
Hubei Provincial Key Laboratory of Intelligent Geo-Information
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference47 articles.
1. Integration of wearable devices in a wireless sensor network for an E-health application;Castillejo;IEEE Wirel. Commun.,2013
2. Wearable medical systems for p-health;Teng;IEEE Rev. Biomed. Eng.,2008
3. Data exfiltration from internet of things devices: iOS devices as case studies;DOrazio;IEEE Internet Things J.,2016
4. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps;D’Orazio;Appl. Math. Comput.,2017
5. A data exfiltration and remote exploitation attack on consumer 3D printers;Do;IEEE Trans. Inf. Forensics Secur.,2016
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献