has been cited by the following article(s):
|
[1]
|
Security and Privacy in the IIoT: Threats, Possible Security Countermeasures, and Future Challenges
Computing&AI Connect,
2025
DOI:10.69709/CAIC.2025.139199
|
|
|
|
|
[2]
|
Root Causes of Insecure Internet of Things and Holistically Addressing Them
2020 International Conference on Computational Science and Computational Intelligence (CSCI),
2020
DOI:10.1109/CSCI51800.2020.00198
|
|
|
|
|
[3]
|
Simulation research on ROF system based on 8PSK and 16PSK modulation
IOP Conference Series: Materials Science and Engineering,
2018
DOI:10.1088/1757-899X/439/5/052027
|
|
|
|