Securing Smart Cities

[1]  Omar Alrawi,et al.  SoK: Security Evaluation of Home-Based IoT Deployments , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[2]  Zhimin Gao,et al.  Blockchain-based Identity Management with Mobile Device , 2018, CRYBLOCK@MobiSys.

[3]  Ehab Al-Shaer,et al.  IoTChecker: A data-driven framework for security analytics of Internet of Things configurations , 2017, Comput. Secur..

[4]  Milos Prvulovic,et al.  EDDIE: EM-based detection of deviations in program execution , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).

[5]  Orestis Mavropoulos,et al.  ASTo: A tool for security analysis of IoT systems , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[6]  Ricardo Neisse,et al.  Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[7]  Prashant Anantharaman,et al.  Building Hardened Internet-of-Things Clients with Language-Theoretic Security , 2017, 2017 IEEE Security and Privacy Workshops (SPW).

[8]  Elisa Bertino,et al.  A Game of Things: Strategic Allocation of Security Resources for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[9]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[10]  Milos Prvulovic,et al.  Spectral profiling: Observer-effect-free profiling by monitoring EM emanations , 2016, 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).

[11]  Ehab Al-Shaer,et al.  IoTSAT: A formal framework for security analysis of the internet of things (IoT) , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[12]  Ali Saman Tosun,et al.  A Testbed for Security and Privacy Analysis of IoT Devices , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[13]  Karl N. Levitt,et al.  Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[14]  Simon Mayer,et al.  Practical semantics for the Internet of Things: Physical states, device mashups, and open questions , 2015, 2015 5th International Conference on the Internet of Things (IOT).

[15]  Arne Skou,et al.  To Do and Not to Do: Constrained Scenarios for Safe Smart House , 2015, 2015 International Conference on Intelligent Environments.

[16]  Nino Vincenzo Verde,et al.  No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position , 2015, NSS.

[17]  Fulvio Corno,et al.  Modeling and formal verification of smart environments , 2014, Secur. Commun. Networks.

[18]  Till F. Paasche,et al.  Smart cities as corporate storytelling , 2014, The Routledge Companion to Smart Cities.

[19]  Juan Carlos Augusto,et al.  Software simulation and verification to increase the reliability of Intelligent Environments , 2013, Adv. Eng. Softw..

[20]  Andreas Zinnen,et al.  Clock skew based remote device fingerprinting demystified , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[21]  Ashish Tiwari,et al.  HybridSAL Relational Abstracter , 2012, CAV.

[22]  Donald W. Loveland,et al.  A machine program for theorem-proving , 2011, CACM.

[23]  E. A. Emerson,et al.  Model checking , 2009, Commun. ACM.

[24]  Martin Vuagnoux,et al.  Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.

[25]  R. Hollands Will the real smart city please stand up? , 2008, The Routledge Companion to Smart Cities.

[26]  Richard Kissel,et al.  Security Considerations in the System Development Life Cycle , 2008 .

[27]  Richard Kissel,et al.  SP 800-64 Rev. 2. Security Considerations in the System Development Life Cycle , 2008 .

[28]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[29]  Sushil Jajodia,et al.  Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs , 2008, Journal of Network and Systems Management.

[30]  Sergey Bratus,et al.  Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.

[31]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[32]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[33]  Sushil Jajodia,et al.  Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..

[34]  Damon McCoy,et al.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.

[35]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[36]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[37]  Philippe Schnoebelen,et al.  Well-structured transition systems everywhere! , 2001, Theor. Comput. Sci..

[38]  Dana Ron,et al.  Learning probabilistic automata with variable memory length , 1994, COLT '94.

[39]  Amir Pnueli,et al.  The temporal logic of programs , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[40]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[41]  J. Mcloughlin,et al.  Cybernetic and General-System Approaches to Urban and Regional Research: A Review of the Literature , 1970 .

[42]  Zhiqiang Lin,et al.  IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.

[43]  N. Komninos,et al.  Exploring the Big Picture of Smart City Research , 2018 .

[44]  Hubert Ritzdorf,et al.  TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing , 2018, NDSS.

[45]  Man-Ki Yoon,et al.  Communication Pattern Monitoring: Improving the Utility of Anomaly Detection for Industrial Control Systems , 2014 .

[46]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[47]  Giuseppe De Pietro,et al.  Formal Design of Ambient Intelligence Applications , 2010, Computer.

[48]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[49]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[50]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[51]  Matthew J. Parkinson,et al.  An axiomatic basis for computer programming , 1969, CACM.