共 50 条
- [42] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
- [44] An Overview of Practical Attacks on BLE Based IOT Devices and Their Security 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 694 - 698
- [45] A survey on Classification of Cyber-attacks on IoT and IIoT devices 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
- [46] Attacks on Resource-Constrained IoT Devices and Security Solutions INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
- [47] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets 2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
- [49] Towards Attention Mechanism in Detecting Botnet Attacks for IoT Devices 2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS, ICABCD 2024, 2024,
- [50] Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices IEEE ACCESS, 2018, 6 : 54343 - 54354