Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
116 страница из 122
21. Alrowaily, M. and Lu, Z., Secure edge computing in IoT systems: Review and case studies, in: 2018 IEEE/ACM Symposium on Edge Computing (SEC), IEEE, pp. 440–444, 2018.
22. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P., Network intrusion detection for IoT security based on learning techniques, in: IEEE Communications Surveys and Tutorials, 2019.
23. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M., Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor., 17, 4, 2347–2376, 2015.
24. Kim, J. and Kim, H., Security vulnerability and considerations in mobile rfid environment, in: 2006 8th International Conference Advanced Communication Technology, vol. 1, IEEE, pp. 801–804, 2006.
25. Bedhief, I., Kassar, M., Aguili, T., Sdn-based architecture challenging the IoT heterogeneity, in: 2016 3rd Smart Cloud Networks and Systems (SCNS), IEEE, pp. 1–3, 2016.
26. Kalkan, K. and Zeadally, S., Securing Internet of Things (IoT) with software defined networking (sdn). IEEE Commun. Mag., 99, 1–7, 2017.