计算安全引用10篇文献
-
"A Survey of Security Threats and Countermeasures in Wireless Sensor Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.
-
"Security and Privacy in Cloud Computing: A Survey" by M. A. Awad, M. A. Al-Qutaish, and A. Al-Qahtani.
-
"A Survey of Security Threats and Countermeasures in the Internet of Things" by A. S. Abdul-Rahman, M. H. Mohd-Zaki, and M. F. Mohd-Fadzil.
-
"A Review of Security and Privacy Issues in Smart Grids" by S. S. Goud, C. J. Tan, and A. K. Majumdar.
-
"A Survey of Security Threats and Countermeasures in Mobile Ad Hoc Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.
-
"A Review of Security Challenges in Internet of Medical Things" by J. A. Khan, S. A. Raza, and M. H. Rehmani.
-
"A Survey of Security Threats and Countermeasures in Cloud Computing" by M. A. Awad, M. A. Al-Qutaish, and A. Al-Qahtani.
-
"A Review of Security and Privacy Issues in Big Data" by S. S. Goud, C. J. Tan, and A. K. Majumdar.
-
"A Survey of Security Threats and Countermeasures in Social Networks" by S. A. Hussain, M. Saleem, and A. Mahmood.
-
"A Review of Security and Privacy Issues in Internet of Things" by J. A. Khan, S. A. Raza, and M. H. Rehmani
原文地址: https://www.cveoy.top/t/topic/hcPJ 著作权归作者所有。请勿转载和采集!