共 55 条
- [1] GUBBI J, BUYYA R, MARUSIC S, Et al., Internet of things (IoT): a vision, architectural ele-ments, and future directions, Future Generation Computer Systems, 29, 7, pp. 1645-1660, (2013)
- [2] EL-HAJJ M, CHAMOUN M, FADLALLAH A, Et al., Analysis of authentication techniques in Internet of things (IoT), Proceedings of the 20171st Cyber Security in Networking Confe-rence, pp. 1-3, (2017)
- [3] EL-HAJJ M, CHAMOUN M, FADLALLAH A, Et al., Taxonomy of authentication techniques in Internet of things (IoT), IEEE 15th Student Conference on Research and Development, pp. 67-71, (2017)
- [4] CISCO. 2019 networking re-port
- [5] BUGHIN J, CHUI M, MANYIKA J., An executive's guide to the Internet of things, McKinsey Quart, 4, pp. 92-101, (2015)
- [6] The Internet of things: mapping the value beyond the hype
- [7] MARESCH D, GARTNER J., Make disruptive technological change happen-the case of additive manufacturing, Technological Forecasting and Social Change, (2018)
- [8] HERNANDEZ G, ARIAS O, BUENTELLO D, Et al., Smart nest thermostat: a smart spy in your home-black hat, (2014)
- [9] TRAPPE W, HOWARD R, MOORE R S., Low-energy security: limits and opportunities in the Internet of things, IEEE Security Privacy, 13, pp. 14-21, (2015)
- [10] AHMED M E, KIM H., DDoS attack mitigation in Internet of things using software defined networking, IEEE Third International Conference on Big Data Computing Service and Applications (Big Data Service), pp. 271-276, (2017)