A Survey on Security Models, Techniques, and Tools for the Internet of Things
暂无分享,去创建一个
Mohamed Hamdi | Tai-Hoon Kim | Raja Benabdessalem | Tai-hoon Kim | Mohamed Hamdi | Raja Benabdessalem
[1] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[2] Christoph Stasch,et al. New Generation Sensor Web Enablement , 2011, Sensors.
[3] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[4] Oscar Garcia-Morchon,et al. Security Considerations in the IP-based Internet of Things , 2013 .
[5] Stefan Falke,et al. Sensor web standards and the internet of things , 2011, COM.Geo.
[6] José Roberto Amazonas,et al. A Novel Smart Home Application Using an Internet of Things Middleware , 2013 .
[7] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[8] Dimitra I. Kaklamani,et al. An Integrated Architecture for Remote Healthcare Monitoring , 2010, 2010 14th Panhellenic Conference on Informatics.
[9] Peter Rosengren,et al. A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems , 2009, 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops.
[10] Elisa Bertino,et al. Trust Negotiation in Identity Management , 2007, IEEE Security & Privacy.
[11] Ilangko Balasingham,et al. Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.
[12] Noel Crespi,et al. The Internet of Things - Concept and Problem Statement , 2012 .
[13] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.