Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]
暂无分享,去创建一个
[1] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[2] Elisa Bertino,et al. Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..
[3] Saraju P. Mohanty,et al. Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..
[4] Jinjun Chen,et al. DLSeF , 2016, ACM Trans. Embed. Comput. Syst..
[5] Jinjun Chen,et al. Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.
[6] Deepak Puthal. Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks , 2012 .
[7] Xiangjian He,et al. Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[8] Albert Y. Zomaya,et al. Rendezvous based routing protocol for wireless sensor networks with mobile sink , 2017, The Journal of Supercomputing.
[9] Diane Honeycutt. “ Developing a Framework to Improve Critical Infrastructure Cybersecurity ” ABB Response to NIST RFI , 2013 .
[10] Saraju P. Mohanty,et al. Wireless sensor network simulation frameworks: A tutorial review: MATLAB/Simulink bests the rest , 2016, IEEE Consumer Electronics Magazine.
[11] Rajiv Ranjan,et al. SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams , 2019, IEEE Transactions on Big Data.