Author:
A. Hamza Alyaa,Abdel-Halim Islam T.,Sobh Mohamed A.,Bahaa-Eldin Ayman M.
Reference83 articles.
1. Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. In 2012 international conference on computer science and electronics engineering (Vol. 3, pp. 648-651). IEEE. https://doi.org/10.1109/iccsee.2012.373
2. M., T., & Al-Muhtadi, J. (2016). Internet of Things Security based on Devices Architecture. International Journal of Computer Applications, 133(15), 19–23. doi:10.5120/ijca2016908191
3. An analysis and classification of public information security data sources used in research and practice;Sauerwein;Computers & Security,2019
4. Program Analysis of Commodity IoT Applications for Security and Privacy;Celik;ACM Comput Surv,2019
5. A new security middleware architecture based on fog computing and cloud to support IoT constrained devices;Razouk,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献