共 50 条
- [41] Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations AMCIS 2011 PROCEEDINGS, 2011,
- [42] Security Analysis of Mobile Device-to-Device Network Applications IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 2922 - 2932
- [43] THREAT PREVENTION & VULNERABILITY ANALYSIS OF SMART CONTRACTS IN BLOCKCHAIN NETWORKS SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2023, 30 (05):
- [44] VPNFilter Malware Analysis on Cyber Threat in Smart Home Network APPLIED SCIENCES-BASEL, 2019, 9 (13):
- [45] PROJECT AND ANALYSIS OF A SMART DEVICE FOR DRUG DOSING ENGINEERING MECHANICS 2020 (IM2020), 2020, : 532 - 535
- [47] Unmanned Aerial Vehicle Smart Device Ground Control Station Cyber Security Threat Model 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 722 - 728
- [48] Privacy Threat Analysis of Mobile Social Network Data Publishing SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 60 - 68
- [49] Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
- [50] Resource-aware mobile device applications - Smart clients know their limitations DR DOBBS JOURNAL, 2006, 31 (03): : 10 - +