Subject
Law,General Computer Science
Reference56 articles.
1. Static verification of security requirements in role based CSCW systems;Ahmed,2003
2. Interoperability of security-enabled internet of things;Alam;Wireless Pers Commun,2011
3. Toward semantic interoperability in oneM2M architecture;Alaya;IEEE Communications Magazine,2015
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey on Cyber Security Encounters and AGI-Based Solutions;Advanced Technologies and Societal Change;2024-08-31
2. Position Paper: Leveraging Large Language Models for Cybersecurity Compliance;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems;Computers & Security;2024-04
4. Enhancing Cyber Security in IoT Systems via Federated Learning;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19
5. loT Security Enhancement: A Cybersecurity Framework;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19