An impact review on internet of things attacks
暂无分享,去创建一个
[1] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[2] Chunquan Du,et al. Research on Urban Public Safety Emergency Management Early Warning System based on Technologies for the Internet of Things , 2012 .
[3] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[4] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[5] Parikshit N. Mahalle. Identity Management Framework for Internet of Things , 2014 .
[6] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[7] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[8] Luís M. Correia,et al. An applications perspective into the Future Internet , 2013, J. Netw. Comput. Appl..
[9] Ivana Murković Steinberg,et al. Wireless smart tag with potentiometric input for ultra low-power chemical sensing , 2013 .
[10] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[11] Faisal Razzak. Spamming the Internet of Things: A Possibility and its probable Solution , 2012, ANT/MobiWIS.
[12] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[13] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[14] Djamal Zeghlache,et al. Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.
[15] Han Li,et al. Secure solution of trusted Internet of things base on TCM , 2013 .
[16] Ju Chen,et al. An Identity Management Framework for Internet of Things , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.
[17] Jing Yu,et al. A Study on the Fire IOT Development Strategy , 2013 .