تیر139825
مراجـع
oDa Cruz, M.A. A. et al. (2018) ‘A reference model for internet of things middleware’, IEEE Internet of Things
Journal, 5(2), pp. 871–883. doi: 10.1109/JIOT.2018.2796561.
oMeidan, Y. et al. (2018) ‘N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders’,
IEEE Pervasive Computing, 17(3), pp. 12–22. doi: 10.1109/MPRV.2018.03367731.
oMiller, B. P., Fredriksen, L. and So, B. (1990) ‘An empirical study of the reliability of unix utilities’,
Communications of the ACM, 33(12), pp. 32–44. doi: 10.1145/96267.96279.
oOrojloo, H. and Azgomi, M. A. (2017) ‘A game-theoretic approach to model and quantify the security of
cyber-physical systems’, Computers in Industry. Elsevier B.V., 88, pp. 44–57. doi:
10.1016/j.compind.2017.03.007.
oTakanen, A., Demott, J. D. and Miller, C. (2018) Fuzzing for software security testing and quality assurance.
2nd edn. Norwood, MA, USA: Artech House, Inc.
oZarpelão, B. B. et al. (2017) ‘A survey of intrusion detection in internet of things’, Journal of Network and
Computer Applications. Elsevier, 84, pp. 25–37. doi: 10.1016/j.jnca.2017.02.009.
اشیاء اینترنت:نفوذ تشخیص و امنیت ،افزارمیان سکوهای-نصرآبادی ذاکری مرتضی23