Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective
暂无分享,去创建一个
Shui Yu | Guojun Wang | Jianwei Niu | Xiting Liu | J. Niu | Guojun Wang | Shui Yu | Xiting Liu
[1] Mengyuan Li,et al. You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing , 2016, IEEE Journal on Selected Areas in Communications.
[2] Song Guo,et al. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.
[3] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Shin-Ming Cheng,et al. Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.
[6] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[7] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[8] Mohsen Guizani,et al. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.
[9] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[10] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[11] Xiaohui Liang,et al. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.
[12] Song Guo,et al. Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[14] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.