基于序列模型的物联网入侵检测系统

程小辉, 牛童, 汪彦君 - 计算机应用 - joca.cn
… The network layer node devices of the Internet of Things mainly communicate through the …
as denial of service than the Internet. Aiming at the security problems faced by wireless sensor …

中国“新基建”: 概念, 现状与问题

刘艳红, 黄雪涛, 石博涵 - 北京工业大学学报(社会科学版), 2020 - journal.bjut.edu.cn
problems that cannot be ignored in the current development, mainly the lack of key core
technical capacity, risks of uncertain technical routes, network and information security issues, …

物联网终端安全能力研究

林美玉, 王亚忠 - 信息通信技术与政策, 2020 - ictp.caict.ac.cn
… has entered a period of rapid development, and the number of Internet of Thingssecurity
issues of the Internet of Things have also attracted more and more attention. Internet of Things

基于云计算的物联网安全问题探讨

林嘉涛, 李玉 - 信息安全研究, 2020 - sicris.cn
challenges brought by the application scenarios of the Internet of things in cloud computing
and the security issues of … specific countermeasures related to the three-level security threats. …

物联网安全参考架构研究

李怡德 - 信息安全研究, 2016 - sicris.cn
… of the Internet of Things (… security issues is also growing more and more wide. In this paper,
we proposed a reference architecture of IoT security on the basis of the stateofart security

低功率且易失封包的物聯網環境中之網路攻擊行為偵測

安迪亞 - 2020 - tdr.lib.ntu.edu.tw
… The IoT revolution brings also security concerns. In particular, the connection of constrained
devices to the internet world produces new threats for human users safety and privacy, as …

低功率且易失封包的物聯網環境中之網路攻擊行為偵測

A Agiollo - 臺灣大學電信工程學研究所學位論文, 2020 - airitilibrary.com
… The IoT revolution brings also security concerns. In particular, the connection of constrained
devices to the internet world produces new threats for human users safety and privacy, as …

處理器抵抗故障注入攻擊之強健與輕量化回復方法

YH Pan - 國立臺灣大學電機工程學系學位論文, 2023 - airitilibrary.com
… has become increasingly critical in the era of the Internet of Things. The core of embedded
… , making processor security a critical concern. Among the security challenges faced by …

低碳供应链环境下物联网RFID 可信度研究

杨传明 - 微电子学与计算机, 2015 - journalmc.com
security theory,the protocol can solve the security problems of access certification,anonymous
security,… ,and improve the credibility of internet of things under low-carbon supply chains …

[引用][C] 铁路物联网系统的安全挑战与对策研究

孙鹏, 张惟皎 - 铁路计算机应用, 2022