Aspects of Application Security for Internet of Things Systems
暂无分享,去创建一个
[1] V. Mahesh,et al. Internet of Things - a study on the security challenges , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[2] Heena Rathore,et al. Bio-inspired machine learning based Wireless Sensor Network security , 2013, 2013 World Congress on Nature and Biologically Inspired Computing.
[3] Özgür B. Akan,et al. A survey on bio-inspired networking , 2010, Comput. Networks.
[4] T. Kramp,et al. Introduction to the Internet of Things , 2013 .
[5] Amala V. Rajan,et al. Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).
[6] Anmol Misra,et al. Android Security: Attacks and Defenses , 2013 .
[7] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[8] Azween Abdullah,et al. Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks , 2008 .
[9] Ran Canetti,et al. Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.
[10] Eduardo Serrano,et al. Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks , 2014 .
[11] Udai Pratap Rao,et al. Internet of Things — Architecture, applications, security and other major challenges , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[12] Reshma Banu,et al. A review on biologically inspired approaches to security for Internet of Things (IoT) , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[13] Nir Bitansky,et al. On Strong Simulation and Composable Point Obfuscation , 2010, CRYPTO.
[14] Francis daCosta. Rethinking the Internet of Things: A Scalable Approach to Connecting Everything , 2014 .
[15] Marco Torchiano,et al. The effectiveness of source code obfuscation: An experimental assessment , 2009, 2009 IEEE 17th International Conference on Program Comprehension.
[16] Aneta Poniszewska-Marańda,et al. Security risks and their prevention capabilities in mobile application development , 2015 .
[17] Lixia Zhang,et al. A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.
[18] Martin Fleury,et al. Multimedia security perspectives in IoT , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[19] Koen De Bosschere,et al. On the Effectiveness of Source Code Transformations for Binary Obfuscation , 2006, Software Engineering Research and Practice.
[20] Adrian McEwen,et al. Designing the Internet of Things , 2013 .
[21] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[22] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[23] Wang Xi,et al. Research on IoT Privacy Security Risks , 2016, 2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII).
[24] Yael Tauman Kalai,et al. On Symmetric Encryption and Point Obfuscation , 2010, TCC.