Smart Security System Using IoT and Mobile Assistance
暂无分享,去创建一个
[1] J. Indumathi,et al. Customized Privacy Preservation Using Unknowns to Stymie Unearthing Of Association Rules , 2007 .
[2] Nazmun Nessa Moon,et al. Smart Security for an Organization based on IoT , 2017 .
[3] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[4] Galileo Galilei,et al. An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems , 2007 .
[5] G. V. Uma,et al. A Bespoked Secure Framework for an Ontology-Based Data-Extraction System , 2008 .
[6] G. V. Uma,et al. A novel framework for optimised privacy preserving data mining using the innovative desultory technique , 2009, Int. J. Comput. Appl. Technol..
[7] J. Indumathi,et al. A Comparative Study of SPKI/SDSI and K-SPKI/SDSI Systems , 2007 .
[8] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[9] J. Indumathi. Amelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing , 2014 .
[10] Ming Yan,et al. SMART LIVING USING BLUETOOTH- BASED ANDROID SMARTPHONE , 2013 .
[11] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[12] Veljko M. Milutinovic,et al. Web Performance Evaluation for Internet of Things Applications , 2016, IEEE Access.
[13] Nan Lin,et al. The research on Internet of things application architecture based on web , 2014, 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA).
[14] Babangida Abubakar,et al. Customary homes to smart homes using Internet of Things (IoT) and mobile application , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[15] J. Indumathi,et al. A New flustering approach for Privacy Preserving Data Fishing in Tele-Health Care Systems , 2008 .
[16] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[17] Rolf H. Weber,et al. Internet of things: Privacy issues revisited , 2015, Comput. Law Secur. Rev..
[18] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[19] J. Indumathi,et al. Using Privacy Preserving Techniques to Accomplish a Secure Accord , 2007 .
[20] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[21] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[22] J. Indumathi. A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining , 2012 .