Immune System for the Internet of Things Using Edge Technologies
暂无分享,去创建一个
[1] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[2] John K. Zao,et al. OpenFog security requirements and approaches , 2017, 2017 IEEE Fog World Congress (FWC).
[3] Sherali Zeadally,et al. Security and Privacy in Ubiquitous Sensor Networks , 2018, J. Inf. Process. Syst..
[4] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[5] Zhiqiang Lin,et al. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.
[6] Hannu Tenhunen,et al. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .
[7] Wiem Tounsi,et al. A survey on technical threat intelligence in the age of sophisticated cyber attacks , 2018, Comput. Secur..
[8] Ning Zhang,et al. LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context , 2017, IEEE Access.
[9] Dong Hyun Jeong,et al. A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.
[10] Chaitanya Aggarwal,et al. Securing IOT devices using SDN and edge computing , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).
[11] Ruirui Zhang,et al. Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment , 2018, J. Inf. Process. Syst..
[12] Rahil Hosseini,et al. A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.
[13] Vijay Sivaraman,et al. Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.
[14] Ralph E. Droms,et al. Manufacturer Usage Description Specification , 2019, RFC.
[15] Jörg Ott,et al. Consolidate IoT Edge Computing with Lightweight Virtualization , 2018, IEEE Network.
[16] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[17] Edward A. Lee,et al. The Cloud is Not Enough: Saving IoT from the Cloud , 2015, HotStorage.
[18] Karen A. Scarfone,et al. Implementing Trusted Geolocation Services in the Cloud | NIST , 2016 .
[19] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[20] Martin Gilje Jaatun,et al. Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[21] Mikko Hypponen,et al. The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation , 2017 .
[22] Partha Pratim Ray,et al. A survey of IoT cloud platforms , 2016 .
[23] Ehab Al-Shaer,et al. IoTChecker: A data-driven framework for security analytics of Internet of Things configurations , 2017, Comput. Secur..
[24] Matthew Roughan,et al. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report) , 2018, ArXiv.
[25] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[26] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[27] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[28] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.