1. "A Survey of Security Threats and Countermeasures in Wireless Sensor Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.

  2. "Security and Privacy in Cloud Computing: A Survey" by M. A. Awad, M. A. Al-Qutaish, and A. Al-Qahtani.

  3. "A Survey of Security Threats and Countermeasures in the Internet of Things" by A. S. Abdul-Rahman, M. H. Mohd-Zaki, and M. F. Mohd-Fadzil.

  4. "A Review of Security and Privacy Issues in Smart Grids" by S. S. Goud, C. J. Tan, and A. K. Majumdar.

  5. "A Survey of Security Threats and Countermeasures in Mobile Ad Hoc Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.

  6. "A Review of Security Challenges in Internet of Medical Things" by J. A. Khan, S. A. Raza, and M. H. Rehmani.

  7. "A Survey of Security Threats and Countermeasures in Cloud Computing" by M. A. Awad, M. A. Al-Qutaish, and A. Al-Qahtani.

  8. "A Review of Security and Privacy Issues in Big Data" by S. S. Goud, C. J. Tan, and A. K. Majumdar.

  9. "A Survey of Security Threats and Countermeasures in Social Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.

  10. "A Review of Security and Privacy Issues in Internet of Things" by J. A. Khan, S. A. Raza, and M. H. Rehmani

计算安全引用10篇文献

原文地址: https://www.cveoy.top/t/topic/hcPJ 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录