Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
117 страница из 122
27. Sidki, L., Ben-Shimol, Y., Sadovski, A., Fault tolerant mechanisms for sdn controllers, in: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE, pp. 173–178, 2016.
28. Shi, Z., Liao, K., Yin, S., Ou, Q., Design and implementation of the mobile internet of things based on td-scdma network, in: 2010 IEEE International Conference on Information Theory and Information Security, IEEE, pp. 954– 957, 2010.
29. Conti, M., Dragoni, N., Lesyk, V., A survey of man in the middle assaults. IEEE Commun. Surv. Tutor., 18, 3, 2027–2051, 2016.
30. Tumrongwittayapak, C. and Varakulsiripunth, R., Detecting sinkhole attack and selective forwarding attack in wireless sensor networks, in: 2009 7th International Conference on Information, Communications and Signal Processing (ICICS), IEEE, pp. 1–5, 2009.
31. Strba, S., Internet of Things Security: Ongoing Threats and Proposed Solutions, 2018.
32. Jesudoss, A. and Subramaniam, N., A survey on authentication assaults and countermeasures in a distributed environment. Indian J. Comput. Sci. Eng. (IJCSE), 5, 2, 71–77, 2014.