Development of an Innovative Internet of Things Security System
暂无分享,去创建一个
[1] Wei Jiang,et al. Design of Real Time Multimedia Platform and Protocol to the Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Michael J. Covington,et al. Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[3] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[4] Gustavo de Veciana,et al. Minimizing energy consumption in large-scale sensor networks through distributed data compression and hierarchical aggregation , 2004, IEEE Journal on Selected Areas in Communications.
[5] Neil W. Bergmann,et al. Server-based Internet of Things Architecture , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[6] Shao Xiwen,et al. Study on Security Issue of Internet of Things Based on RFID , 2012, 2012 Fourth International Conference on Computational and Information Sciences.
[7] SklavosNicolas,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011 .
[8] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[9] Junwei Lv,et al. A new clock synchronization architecture of network for Internet of Things , 2011, International Conference on Information Science and Technology.
[10] Pascal Urien. LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[11] Guanyu Li,et al. Descriptive models for Internet of Things , 2010, 2010 International Conference on Intelligent Control and Information Processing.
[12] Xin Zhou,et al. Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.
[13] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[14] Lida Xu,et al. Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.
[15] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[16] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[17] Dharma P. Agrawal,et al. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[18] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[19] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[20] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[21] Yuxi Liu,et al. Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.
[22] Satish G. Kamble,et al. Probabilistic model for Intrusion Detection in Wireless Sensor Network , 2012 .
[23] Shen Bin,et al. Research on data mining models for the internet of things , 2010, 2010 International Conference on Image Analysis and Signal Processing.
[24] Antonio F. Gómez-Skarmeta,et al. Oxygen Cylinders Management Architecture Based on Internet of Things , 2011, 2011 International Conference on Computational Science and Its Applications.
[25] Óscar García-Morchón,et al. HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[26] Florian Michahelles,et al. Architecting the Internet of Things , 2011 .
[27] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[28] Xiong Li,et al. Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[29] Huansheng Ning,et al. Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.
[30] Jaydip Sen,et al. Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.