A Redundancy-based Security Model for Smart Home
暂无分享,去创建一个
[1] Sudhir T. Bagade,et al. Internet of Things: Architecture, Security Issues and Countermeasures , 2015 .
[2] Li-Chen Fu,et al. Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] Roy H. Campbell,et al. Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[4] Tarek F. Abdelzaher,et al. SATIRE: a software architecture for smart AtTIRE , 2006, MobiSys '06.
[5] Athanasios V. Vasilakos,et al. Secure Smart Homes , 2017, ACM Comput. Surv..
[6] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[7] Ozgur Koray Sahingoz,et al. A survey of intrusion detection systems in wireless sensor networks , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).
[8] Javier Rubio-Loyola,et al. Maximizing packet loss monitoring accuracy for reliable trace collections , 2008, 2008 16th IEEE Workshop on Local and Metropolitan Area Networks.
[9] Carsten Maple,et al. Security and privacy in the internet of things , 2017 .
[10] Dariusz Król,et al. Updatable Multi-agent OSGi Architecture for Smart Home System , 2010, KES-AMSTA.
[11] Jong Hyuk Park,et al. SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .
[12] Ivan Marsá-Maestre,et al. A Hierarchical, Agent-based Approach to Security in Smart Offices , 2006, ICUC.
[13] Jin-Young Choi,et al. Home-Network Security Model in Ubiquitous Environment , 2007 .
[14] Jingsha He,et al. An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning , 2017, Future Internet.
[15] Gregory D. Abowd,et al. The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.
[16] Ali Ismail Awad,et al. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.
[17] Sylvain Giroux,et al. Enforcing Security in Smart Homes using Security Patterns , 2009 .
[18] Byoungcheon Lee,et al. Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..
[19] Olawumi Olayemi,et al. Security issues in smart homes and mobile health system: threat analysis, possible countermeasures and lessons learned , 2017 .
[20] Juan Carlos Augusto,et al. The Use of Temporal Reasoning and Management of Complex Events in Smart Homes , 2004, ECAI.
[21] W. Granzer,et al. Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.
[22] Donal O'Mahony,et al. Securing Communications in the Smart Home , 2004, EUC.
[23] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[24] Robbie Schaefer,et al. Securing Personal Data in Smart Home Environments , 2006 .
[25] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[26] Jong Wook Han,et al. Security Technologies Based on Home Gateway for Making Smart Home Secure , 2007, EUC Workshops.