共 50 条
- [41] Discovering and exploiting 802.11 wireless driver vulnerabilities JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (01): : 25 - 37
- [42] Security Vulnerabilities in LPWANs-An Attack Vector Analysis for the IoT Ecosystem APPLIED SCIENCES-BASEL, 2021, 11 (07):
- [43] Discovering Vulnerabilities and Patches for Open Source Security PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 641 - 648
- [45] Healthcare IoT: Benefits, Vulnerabilities and Solutions PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 517 - 522
- [46] Comprehensive Study of IoT Vulnerabilities and Countermeasures APPLIED SCIENCES-BASEL, 2025, 15 (06):
- [47] IoT - Supply Chain Forensics and Vulnerabilities 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 106 - 109
- [48] Security Vulnerabilities in Consumer IoT Applications 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
- [49] Vulnerabilities in Hub Architecture IoT Devices 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
- [50] Security Analysis of IoT Frameworks using Static Taint Analysis CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 203 - 213