Improving Smart Home Security: Integrating Logical Sensing Into Smart Home
暂无分享,去创建一个
[1] Abdul Hanan Abdullah,et al. Traffic Engineering Based on Effective Envelope Algorithm on Novel Resource Reservation Method over Mobile Internet Protocol Version 6 , 2012, ArXiv.
[2] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Young-Bae Ko,et al. Design and implementation of intelligent home control systems based on active sensor networks , 2008, IEEE Transactions on Consumer Electronics.
[4] Xin Zhang,et al. Modeling of nonlinear system based on deep learning framework , 2016 .
[5] Ali Ziya. An Internet Based Wireless Home Automation System for Multifunctional Devices , 2005 .
[6] Sin-Min Tsai,et al. A service of home security system on intelligent network , 1997 .
[7] Gerhard P. Hancke,et al. Unimodal and Multimodal Biometric Sensing Systems: A Review , 2016, IEEE Access.
[8] Derek Deadman,et al. Forecasting Residential Burglary , 2003 .
[9] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[10] Uyen Trang Nguyen,et al. A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks , 2013, IEEE Transactions on Information Forensics and Security.
[11] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[12] A. Alheraish,et al. Design and implementation of home automation system , 2004, IEEE Transactions on Consumer Electronics.
[13] Vinod Namboodiri,et al. Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.
[14] Reza Malekian,et al. TMicroscope: Behavior Perception Based on the Slightest RFID Tag Motion , 2016 .
[15] Arun Cyril Jose,et al. Smart Home Automation Security: A Literature Review , 2015, Smart Comput. Rev..
[16] Dongkyoo Shin,et al. Research and implementation of the context-aware middleware for controlling home appliances , 2005, 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE..
[17] Suk Lee,et al. A pyroelectric infrared sensor-based indoor location-aware system for the smart home , 2006, IEEE Transactions on Consumer Electronics.
[18] Reza Malekian,et al. TrackT: Accurate tracking of RFID tags with mm-level accuracy using first-order taylor series approximation , 2016, Ad Hoc Networks.
[19] Suman Saha. Consideration Points Detecting Cross-Site Scripting , 2009, ArXiv.
[20] W. Keith Edwards,et al. Intelligibility and Accountability: Human Considerations in Context-Aware Systems , 2001, Hum. Comput. Interact..
[21] Yanbo Zhao,et al. A low cost GSM/GPRS based wireless home security system , 2008, IEEE Transactions on Consumer Electronics.
[22] James Bret Michael,et al. Securing the ZigBee Protocol in the Smart Grid , 2012, Computer.
[23] Alfredo De Santis,et al. Bounds on entropy in a guessing game , 2001, IEEE Trans. Inf. Theory.
[24] Jeng-Shyang Pan,et al. A Fire-Alarming Method Based on Video Processing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[25] Sayidul Morsalin,et al. Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application , 2016, 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).
[26] Kyung Chang Lee,et al. Resident Location-Recognition Algorithm Using a Bayesian Classifier in the PIR Sensor-Based Indoor Location-Aware System , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[27] Behrang Fouladi,et al. Security Evaluation of the Z-Wave Wireless Protocol , 2013 .
[28] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[29] Byoungcheon Lee,et al. Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..
[30] Tao Chen,et al. Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks , 2016 .
[31] Youssif B. Al-Nashif,et al. Anomaly Behavior Analysis System for ZigBee in smart buildings , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[32] Arun Cyril Jose,et al. Improving Home Automation Security; Integrating Device Fingerprinting Into Smart Home , 2016, IEEE Access.
[33] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[34] David C. Feldmeier,et al. UNIX Password Security - Ten Years Later , 1989, CRYPTO.
[35] K. Atukorala,et al. SmartEye Integrated Solution to Home Automation, Security and Monitoring through Mobile Phones , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.
[36] Chi Harold Liu,et al. A survey of context-aware middleware designs for human activity recognition , 2014, IEEE Communications Magazine.
[37] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[38] Emin Islam Tatli. Cracking More Password Hashes With Patterns , 2015, IEEE Transactions on Information Forensics and Security.
[39] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[40] Sergio Saponara,et al. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid , 2012, J. Comput. Networks Commun..
[41] Behrooz Shirazi,et al. Home automation and security for mobile devices , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).