A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues
暂无分享,去创建一个
Abhishek Singh | Ashish Payal | Sourabh Bharti | Abhishek Singh | A. Payal | Sourabh Bharti | Ashish Payal
[1] Josep Paradells Aspas,et al. Smart Cities as an Application of Internet of Things: Experiences and Lessons Learnt in Barcelona , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[2] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[3] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[4] Thomas Kunz,et al. Operating Systems for Wireless Sensor Networks: A Survey , 2011, Sensors.
[5] Jonathan Larsson,et al. CLIENT-SIDE EVALUATION OF QUALITY OF SERVICE IN CLOUD APPLICATIONS , 2017 .
[6] Franco Zambonelli,et al. Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence , 2012, Pervasive Mob. Comput..
[7] Marimuthu Palaniswami,et al. An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.
[8] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[9] Subhas Chandra Mukhopadhyay,et al. Internet of Things: Challenges and Opportunities , 2014 .
[10] Hongming Cai,et al. Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm , 2018, IEEE Transactions on Computational Social Systems.
[11] Kris Steenhaut,et al. Evaluation of constrained application protocol for wireless sensor networks , 2011, 2011 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN).
[12] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[13] Rüdiger Frank. Jacob Fraden: Handbook of modern sensors: physics, designs, and applications , 2005 .
[14] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[15] Jad El-khoury,et al. Making interoperability visible: Data visualization of cyber-physical systems development tool chains , 2016, J. Ind. Inf. Integr..
[16] H. Madsen,et al. Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).
[17] François Carrez,et al. Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[18] Fei Tao,et al. Data and knowledge mining with big data towards smart production , 2017, J. Ind. Inf. Integr..
[19] Hong Chen,et al. Applications of Cyber-Physical System: A Literature Review , 2017 .
[20] Kevin C. Desouza,et al. Intelligent agents for competitive intelligence: Survey of applications , 2001 .
[21] Xinjun Qi,et al. An Overview of Privacy Preserving Data Mining , 2012 .
[22] Paul R. Jackson,et al. Shifting paradigm to service-dominant logic via Internet-of-Things with applications in the elevators industry , 2017 .
[23] Milutin Radonjic,et al. The IoT Architectural Framework, Design Issues and Application Domains , 2017, Wirel. Pers. Commun..
[24] Yang Lu,et al. Cyber Physical System (CPS)-Based Industry 4.0: A Survey , 2017 .
[25] Simon G. M. Koo,et al. Internet of Things: Services and Applications Categorization , 2011, Adv. Internet Things.
[26] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[27] Yang Lu,et al. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics , 2019, IEEE Internet of Things Journal.
[28] Munindar P. Singh,et al. The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[29] Ken Sakamura,et al. Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things , 2010, IEEE Pervasive Computing.
[30] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[31] Benny Pinkas,et al. Peer-to-Peer Secure Multi-party Numerical Computation , 2008, Peer-to-Peer Computing.
[32] Qiaoyan Wen,et al. An identity-based personal location system with protected privacy in IOT , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[33] Hong Chen,et al. Theoretical Foundations for Cyber-Physical Systems: A Literature Review , 2017 .
[34] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[35] Fadi Al-Turjman,et al. 5G-enabled devices and smart-spaces in social-IoT: An overview , 2017, Future Gener. Comput. Syst..
[36] Basavaraj Patil,et al. IPv6 over BLUETOOTH(R) Low Energy , 2015, RFC.
[37] Wen Liu,et al. A Protocol of Secure Multi-party Multi-data Ranking and Its Application in Privacy Preserving Sequential Pattern Mining , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.
[38] T. W. Chim,et al. Weighted average problem revisited under hybrid and malicious model , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).
[39] Michael Mealling,et al. A Uniform Resource Name Namespace for the EPCglobal Electronic Product Code (EPC) and Related Standards , 2008, RFC.
[40] Charalampos Doukas,et al. Building Internet of Things with the Arduino , 2012 .
[41] Meir Kalech,et al. Sensor fault detection and diagnosis for autonomous systems , 2013, AAMAS.
[42] Edward A. Lee,et al. Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .
[43] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[44] Li D. Xu,et al. QoS Recommendation in Cloud Services , 2017, IEEE Access.
[45] Li Mingdong,et al. Services and Key Technologies of the Internet of Things , 2020 .
[46] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[47] Hongming Cai,et al. Healthcare data analysis system for regional medical union in smart city , 2018, Journal of Management Analytics.
[48] Luiz Affonso Guedes,et al. A dependability evaluation for Internet of Things incorporating redundancy aspects , 2014, Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control.
[49] Alessandro Bassi,et al. Enabling Things to Talk , 2013, Springer Berlin Heidelberg.
[50] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[51] Tarek F. Abdelzaher,et al. The LiteOS Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[52] Mohammed Atiquzzaman,et al. Interoperability in Internet of Things: Taxonomies and Open Challenges , 2018, Mobile Networks and Applications.
[53] Hwaiyu Geng,et al. Internet of Things and Data Analytics Handbook , 2017 .
[54] Rong Zheng,et al. Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..
[55] Michele Zorzi,et al. Architecture and protocols for the Internet of Things: A case study , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[56] Matti Siekkinen,et al. How low energy is bluetooth low energy? Comparative measurements with ZigBee/802.15.4 , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[57] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[58] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[59] Xiaojiang Chen,et al. A QoS Architecture for IOT , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[60] Nalini Venkatasubramanian,et al. A Software Defined Networking architecture for the Internet-of-Things , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[61] Mikhail J. Atallah,et al. Private Information: To Reveal or not to Reveal , 2008, TSEC.
[62] Kun Wang,et al. Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[63] Jakob Buron,et al. Home Automation Routing Requirements in Low-Power and Lossy Networks , 2008, RFC.
[64] Byung-Seo Kim,et al. Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.
[65] Mehdi Dastani,et al. Programming norm-aware agents , 2012, AAMAS.
[66] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[67] Florian Kerschbaum,et al. Privacy-preserving computation of benchmarks on item-level data using RFID , 2010, WiSec '10.
[68] Anders Fongen,et al. Identity Management and Integrity Protection in the Internet of Things , 2012, 2012 Third International Conference on Emerging Security Technologies.
[69] Harmanjot Kaur. A Literature Review on Internet of Things Application Layer Communication Protocols , 2019 .
[70] Ricardo Simon Carbajo,et al. Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes , 2009, PM2HW2N '09.
[71] Giovanni Emanuele Corazza,et al. Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[72] Abdelmadjid Bouabdallah,et al. Reliability for Emergency Applications in Internet of Things , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[73] Antonio F. Gómez-Skarmeta,et al. Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN) , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[74] Guido Boella,et al. How to Program Organizations and Roles in the JADE Framework , 2008, MATES.
[75] Opher Etzion,et al. Event processing under uncertainty , 2012, DEBS.
[76] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[77] Heng Wang,et al. A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices , 2017, IEEE Access.
[78] Thomas C. Schmidt,et al. RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[79] Panagiotis G. Sarigiannidis,et al. Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.
[80] Arijit Mukherjee,et al. ANGELS for distributed analytics in IoT , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[81] H. Hashim,et al. A lightweight and secure TFTP protocol for smart environment , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[82] Lida Xu,et al. Cloud Service Negotiation in Internet of Things Environment: A Mixed Approach , 2014, IEEE Transactions on Industrial Informatics.
[83] Hossein Hassani,et al. Banking with blockchain-ed big data , 2018, Journal of Management Analytics.
[84] J. V. Rauff,et al. Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence , 2005 .
[85] Alexander Gluhak,et al. A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.
[86] Gianluca Reali,et al. Comparison of two lightweight protocols for smartphone-based sensing , 2013, 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT).
[87] Miika Komu,et al. Techno-economic feasibility analysis of constrained application protocol , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[88] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[89] Gordan Jezic,et al. Beyond the Internet of Things: The Social Networking of Machines , 2016, Int. J. Distributed Sens. Networks.
[90] Anna Calveras Augé,et al. TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS , 2013, J. Sens. Actuator Networks.
[91] Jaydip Sen,et al. Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.
[92] Radha Poovendran,et al. Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.
[93] Xiaofei Wang,et al. A multiple communication standards compatible IoT system for medical usage , 2013, 2013 IEEE Faible Tension Faible Consommation.
[94] Yu Yang,et al. Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.
[95] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[96] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[97] Hoeteck Wee,et al. Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[98] Qing Wang,et al. Wireless IoT Platform Based on SDR Technology , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[99] Roberto Riggio,et al. DARE: evaluating Data Accuracy using node REputation , 2013, Comput. Networks.
[100] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[101] Zhao Haitao,et al. Cross-layer framework for fine-grained channel access in next generation high-density WiFi networks , 2016 .
[102] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[103] Hiroaki Harai,et al. A Resource Mobility Scheme for Service-Continuity in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[104] Arjun Sharma,et al. Park-A-Lot: An Automated Parking Management System , 2013 .
[105] Muli Ben-Yehuda,et al. The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..
[106] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[107] Richard Grayson,et al. An internet of things , 2015 .
[108] Li Da Xu,et al. Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..
[109] Sheng Huang,et al. TSAaaS: Time Series Analytics as a Service on IoT , 2014, 2014 IEEE International Conference on Web Services.
[110] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[111] Pasi Tyrväinen,et al. A framework for evaluating Internet-of-Things platforms: Application provider viewpoint , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[112] David Evans,et al. Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[113] Sourabh Bharti,et al. Gravitational outlier detection for wireless sensor networks , 2016, Int. J. Commun. Syst..
[114] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[115] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[116] Rafael H. Bordini,et al. BDI Agent Programming in AgentSpeak Using Jason (Tutorial Paper) , 2005, CLIMA.
[117] L. A. Grieco,et al. Performance analysis of the RPL Routing Protocol , 2011, 2011 IEEE International Conference on Mechatronics.
[118] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[119] Hong Linh Truong,et al. MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[120] Kerry L. Taylor,et al. Semantics for the Internet of Things: Early Progress and Back to the Future , 2019 .
[121] Sudip Misra,et al. Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior , 2011, Soft Computing.
[122] Lida Xu,et al. CLOUDQUAL: A Quality Model for Cloud Services , 2014, IEEE Transactions on Industrial Informatics.
[123] S. Singh,et al. Routing Protocols in Wireless Sensor Networks - A Survey , 2010 .
[124] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[125] Rajkumar Buyya,et al. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..
[126] Mehedi Hasan,et al. Domicile - An IoT Based Smart Home Automation System , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).
[127] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[128] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[129] B. B. P. Rao,et al. Cloud computing for Internet of Things & sensing based applications , 2012, 2012 Sixth International Conference on Sensing Technology (ICST).
[130] Durgesh Kumar Mishra,et al. Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[131] Huiqun Yu,et al. Modeling and analyzing web application with aspect-oriented hierarchical Coloured Petri Nets , 2016, China Communications.
[132] Eleonora Borgia,et al. The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..
[133] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[134] Xavier Masip-Bruin,et al. A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration , 2018, ACM Comput. Surv..
[135] Nik Bessis,et al. Towards Simulating the Internet of Things , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[136] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[137] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[138] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[139] Mikhail J. Atallah,et al. Hidden access control policies with hidden credentials , 2004, WPES '04.
[140] Garth V. Crosby,et al. Wireless sensor networks and LTE-A network convergence , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[141] Nader Mohamed,et al. Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[142] Wei Jiang,et al. Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[143] Zuo Chao,et al. Design and Implementation of a Smart IoT Gateway , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[144] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[145] Lida Xu,et al. Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..
[146] Bo Hu,et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.
[147] Geoffrey Fox,et al. Architecture and measured characteristics of a cloud based internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[148] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[149] Samik Basu,et al. Deciding choreography realizability , 2012, POPL '12.
[150] Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
[151] Klaus Moessner,et al. Service Continuity for Subscribers of the Mobile Real World Internet , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[152] Munindar P. Singh,et al. Generalized Commitment Alignment , 2015, AAMAS.
[153] Munindar P. Singh,et al. Interaction protocols as design abstractions for business processes , 2005, IEEE Transactions on Software Engineering.
[154] Xiaoping Ma,et al. Performance evaluation of MQTT and CoAP via a common middleware , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[155] D.K. Mishra,et al. A zero-hacking protocol for secure multiparty computation using multiple TTP , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[156] Tilman Wolf,et al. Automated Sensor Verification Using Outlier Detection in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[157] Dieter Uckelmann,et al. Performance Measurement and Cost Benefit Analysis for RFID and Internet of Things Implementations in Logistics , 2012 .
[158] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[159] Paulo F. Pires,et al. The Resource Management Challenge in IoT , 2017 .
[160] R. Kshetrimayum,et al. An introduction to UWB communication systems , 2009, IEEE Potentials.
[161] Michael Winikoff. Designing Commitment-Based Agent Interactions , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[162] Chia-Peng Lee,et al. Group Mobility Management for Large-Scale Machine-to-Machine Mobile Networking , 2014, IEEE Transactions on Vehicular Technology.
[163] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[164] Roy Want,et al. Near field communication , 2011, IEEE Pervasive Computing.
[165] Mehdi Dastani,et al. 2APL: a practical agent programming language , 2008, Autonomous Agents and Multi-Agent Systems.
[166] Jacob Fraden,et al. Handbook of modern sensors , 1997 .
[167] Chao Yang,et al. Intelligent Edge Computing for IoT-Based Energy Management in Smart Cities , 2019, IEEE Network.
[168] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[169] Thomas H. Clausen,et al. A critical evaluation of the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[170] Dongxi Liu,et al. Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies , 2019, IEEE Network.
[171] Diane J. Cook,et al. CASAS: A Smart Home in a Box , 2013, Computer.