A Survey of Various Methods for Analyzing the Amazon Echo
暂无分享,去创建一个
Ike Clinton School of Mathematics and Computer Science The Citadel, The Military College of South Carolina Charleston, South Carolina 29409 Email: iclinton@citadel.edu Lance Cook School of Mathematics and Computer Science The Citadel, The Military College of South Carolina Charleston, South Carolina 29409 Email: lcook2@citadel.edu Dr. Shankar Banik School of Mathematics and Computer Science The Citadel, The Military College of South Carolina Charleston, South Carolina 29409 Email: shankar.banik@citadel.edu
[1] Syed Muhammad Sajjad,et al. Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT) , 2014, 2014 Conference on Information Assurance and Cyber Security (CIACS).
[2] Sean W. Smith,et al. Cryptographic scalability challenges in the smart grid (extended abstract) , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[3] Marco Vieira,et al. Penetration Testing for Web Services , 2014, Computer.