Author:
Han Yinfeng,Wang Peng,Kang Chaoqun,Lin Jiayin,Fan Wei
Reference32 articles.
1. MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT);Hintaw;IETE J. Res.,2023
2. CHIMP: a learning-based power-aware communication protocol for wireless body area networks;Arghavani;ACM Trans. Embed. Comput. Syst.,2019
3. EM monitoring and classification of IEMI and protocol-based attacks on IEEE 802.11n communication networks;Villain;IEEE Trans. Electromagn C.,2019
4. Optimization and Simulation of key methods of industrial Ethernet communication protocol;Yang;Comput. Simulat.,2022
5. 5G RRC protocol and stack vulnerabilities detection via listen-and-learn[C]//2023;Yang,2023