暂无分享,去创建一个
Mahmoud Elkhodr | Hon Cheung | Seyed A. Shahrestani | S. Shahrestani | Hon Cheung | M. Elkhodr | Mahmoud Elkhodr
[1] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[2] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[3] Michael Blackstock,et al. Toward interoperability in a web of things , 2013, UbiComp.
[4] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[5] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[6] Charu C. Aggarwal,et al. The Internet of Things: A Survey from the Data-Centric Perspective , 2013, Managing and Mining Sensor Data.
[7] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[8] P. Venkata Krishna,et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[9] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[10] Adam P. Arkin,et al. Data and Databases , 2007 .
[11] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[12] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[13] Yen-Kuang Chen,et al. Challenges and opportunities of internet of things , 2012, 17th Asia and South Pacific Design Automation Conference.
[14] Jalel Ben-Othman,et al. Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[15] Catherine Pelachaud,et al. Emotion-Oriented Systems , 2011 .
[16] Bo Yang,et al. Efficient naming, addressing and profile services in Internet-of-Things sensory environments , 2014, Ad Hoc Networks.
[17] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[18] Hon Cheung,et al. A review of mobile location privacy in the Internet of Things , 2012, 2012 Tenth International Conference on ICT and Knowledge Engineering.
[19] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[20] Jing Li,et al. An Authorization Management Approach in the Internet of Things , 2012 .
[21] Shuang-Hua Yang,et al. How the internet of things technology enhances emergency response operations , 2013 .
[22] Matt Welsh,et al. Programming Sensor Networks Using Abstract Regions , 2004, NSDI.
[23] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[24] Najah AbuAli,et al. Data management for the Internet of Things: Green directions , 2012, 2012 IEEE Globecom Workshops.
[25] Mahmoud Elkhodr,et al. The Internet of Things: Vision & challenges , 2013, IEEE 2013 Tencon - Spring.
[26] A. K. Dwivedi,et al. Exploration of Existing Frameworks for Connecting Wireless Sensor Networks (WSNs) with Current Internet , 2014 .
[27] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[28] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[29] Ilias Maglogiannis,et al. Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[30] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[31] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[32] Peter Bernus,et al. Analysis of Interoperability in the Queensland Disaster Management System , 2013, ICEIS.
[33] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[34] Mahmoud Elkhodr,et al. A semantic obfuscation technique for the Internet of Things , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[35] Abdul Qayoom Bhat,et al. Study of Wireless Sensor Networks its Routing Challenges and Available Sensor Nodes , 2013 .