Securing the Internet of Things
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[2] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[3] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[4] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[5] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[6] Partha Dasgupta,et al. Software Based Remote Attestation for OS Kernel and User Applications , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[7] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[8] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[9] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[10] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[11] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[12] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[13] Tao Zhang,et al. Securing Connected Vehicles End to End , 2014 .
[14] Barack Obama,et al. Statement on the Release of the 'Framework for Improving Critical Infrastructure Cybersecurity' by the National Institute of Standards and Technology, February 12, 2014 , 2014 .
[15] Gene Tsudik,et al. A minimalist approach to Remote Attestation , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[16] Meijie Zhai,et al. A TCM-Based Remote Anonymous Attestation Protocol for Power Information System , 2015 .
[17] Valtteri Niemi,et al. Demo: Cloud-based Security as a Service for Smart IoT Environments , 2015, S3@MobiCom.