Security for Internet of Things: The SerIoT Project
暂无分享,去创建一个
Dimitrios Tzovaras | Erol Gelenbe | Anastasios Drosou | Tadeusz Czachórski | Joanna Domanska | E. Gelenbe | D. Tzovaras | A. Drosou | T. Czachórski | J. Domańska
[1] Erol Gelenbe,et al. The impact of information technology on energy consumption and carbon emissions , 2015, UBIQ.
[2] Michele Pagano,et al. Delays in IP Routers, a Markov Model , 2016, ISCIS.
[3] Erol Gelenbe. Réseaux neuronaux aléatoires stables , 1990 .
[4] Dimitrios Tzovaras,et al. A Consistency-Based Multimodal Graph Embedding Method for Dimensionality Reduction , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[5] Erol Gelenbe,et al. Counter based detection and mitigation of signalling attacks , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).
[6] Erol Gelenbe,et al. Learning in the Recurrent Random Neural Network , 1992, Neural Computation.
[7] Athanasios V. Vasilakos,et al. Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.
[8] Fatih Alagöz,et al. Defense Mechanisms against DDoS Attacks in SDN Environment , 2017, IEEE Communications Magazine.
[9] Erol Gelenbe,et al. A diffusion model for packet travel time in a random multihop medium , 2007, TOSN.
[10] Erol Gelenbe. Dealing with software viruses: A biological paradigm , 2007, Inf. Secur. Tech. Rep..
[11] Yasir Mehmood,et al. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.
[12] Ruppa K. Thulasiram,et al. Guest Editorial: Special Issue on Green Pervasive and Ubiquitous Systems , 2017, IEEE Syst. J..
[13] Erol Gelenbe,et al. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.
[14] Dimitrios Tzovaras,et al. A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks , 2016, IEEE Transactions on Mobile Computing.
[15] Dimitrios Tzovaras,et al. NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem , 2013, ISCIS.
[16] Aviv Zohar. Bitcoin , 2015, Commun. ACM.
[17] Erol Gelenbe,et al. Steps toward self-aware networks , 2009, CACM.
[18] Dimitrios Tzovaras,et al. A multi-objective clustering approach for the detection of abnormal behaviors in mobile networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[19] Karl N. Levitt,et al. A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[20] Daojing He,et al. Imminent Communication Security for Smart Communities , 2018, IEEE Communications Magazine.
[21] Mahmut T. Kandemir,et al. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.
[22] Erol Gelenbe,et al. Optimizing Secure SDN-Enabled Inter-Data Centre Overlay Networks through Cognitive Routing , 2016, 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS).
[23] Helga E. Melcherts. The Internet of Everything and Beyond: The Interplay between Things and Humans , 2017 .
[24] Tadeusz Czachórski,et al. Diffusion Approximation Model for the Distribution of Packet Travel Time at Sensor Networks , 2008, EuroNGI Workshop.
[25] Michele Pagano,et al. The Fluid Flow Approximation of the TCP Vegas and Reno Congestion Control Mechanism , 2016, ISCIS.
[26] Dimitrios Tzovaras,et al. An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data , 2016, J. Innov. Digit. Ecosyst..
[27] Erol Gelenbe,et al. Towards a cognitive routing engine for software defined networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[28] Erol Gelenbe,et al. Learning in the multiple class random neural network , 2002, IEEE Trans. Neural Networks.
[29] Guo Da,et al. Study of WAPI technology and security , 2010, 2010 IEEE 2nd Symposium on Web Society.
[30] Erol Gelenbe,et al. Biological Metaphors for Agent Behavior , 2004, ISCIS.
[31] Erol Gelenbe,et al. Opportunistic Communications for Emergency Support Systems , 2011, ANT/MobiWIS.
[32] Erol Gelenbe,et al. Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[33] Erol Gelenbe,et al. Virus Tests to Maximize Availability of Software Systems , 1994, Theor. Comput. Sci..
[34] Erol Gelenbe,et al. Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks , 2016, IEEE Transactions on Emerging Topics in Computing.
[35] Sherali Zeadally,et al. Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.
[36] Erol Gelenbe,et al. Signalling storms in 3G mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[37] Dimitrios Tzovaras,et al. GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control , 2018, Euro-CYBERSEC.
[38] Amitava Ghosh,et al. Recent advancements in M2M communications in 4G networks and evolution towards 5G , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[39] Erol Gelenbe. Keeping Viruses Under Control , 2005, ISCIS.
[40] Essaid Sabir,et al. Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services , 2017, IEEE Communications Magazine.
[41] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[42] J. W Cohen. Introduction aux réseaux de files d'attente: E. GELENBE and G. PUJOLLE Collection Techniques et Scientifique des Télécommunications, Eyrolles, Paris, 1982, ix + 192 pages , 1983 .