IoT Security Framework for Smart Water System
暂无分享,去创建一个
Salim Hariri | Jesus Pacheco | Daniela Ibarra | Ashamsa Vijay | S. Hariri | J. Pacheco | Daniel Ibarra | Ashamsa Vijay
[1] Anuradha M. Annaswamy,et al. Emerging research topics in control for smart infrastructures , 2016, Annu. Rev. Control..
[2] Vipin Kumar,et al. A Comparative Study of Classification Techniques for Intrusion Detection , 2013, 2013 International Symposium on Computational and Business Intelligence.
[3] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[4] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[5] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[6] Chung-Horng Lung,et al. Smart Home: Integrating Internet of Things with Web Services and Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[7] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[8] Edna Dias Canedo,et al. IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and arduino , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[9] A. H. Buckman,et al. What is a Smart Building , 2014 .
[10] Ping Zhang,et al. Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[11] Yusuf Abdullahi Badamasi. The working principle of an Arduino , 2014, 2014 11th International Conference on Electronics, Computer and Computation (ICECCO).
[12] Dianxiang Xu,et al. Automated Security Test Generation with Formal Threat Models , 2012, IEEE Transactions on Dependable and Secure Computing.
[13] Yang Lijun,et al. Security Architecture and Key Technologies for IoT/CPS , 2011 .
[14] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[15] Salim Hariri,et al. IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[16] Lingfeng Wang,et al. Multi-agent control system with information fusion based comfort model for smart buildings , 2012 .
[17] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[18] Gareth Halfacree,et al. Raspberry Pi User Guide , 2012 .
[19] Johannes Schneider,et al. Structured system threat modeling and mitigation analysis for industrial automation systems , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[20] Vinod Namboodiri,et al. Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.
[21] Youakim Badr,et al. Risk management and security in service-based architectures , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.
[22] Salim Hariri,et al. Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..
[23] Salim Hariri,et al. Anomaly-Based Behavior Analysis of Wireless Network Security , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[24] Marimuthu Palaniswami,et al. An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.
[25] Matthew N. O. Sadiku,et al. Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.
[26] A. J. Jerri. The Shannon sampling theorem—Its various extensions and applications: A tutorial review , 1977, Proceedings of the IEEE.
[27] Yaser Jararweh,et al. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[28] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[29] I. Sasase,et al. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[30] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[31] Ayan Banerjee,et al. Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[32] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[33] Ozgur Koray Sahingoz,et al. A survey of intrusion detection systems in wireless sensor networks , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).
[34] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .