A lightweight cyber security framework with context-awareness for pervasive computing environments
暂无分享,去创建一个
Joel J. P. C. Rodrigues | Kashif Saleem | Amjad Gawanmeh | Jalal Al-Muhtadi | Muhammad Imran | Sumayah Al-Rabiaah | J. Al-Muhtadi | K. Saleem | J. Rodrigues | A. Gawanmeh | M. Imran | Sumayah Al-Rabiaah | Amjad Gawanmeh
[1] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[2] Junaid Shuja,et al. A lightweight and compromise-resilient authentication scheme for IoTs , 2019, Trans. Emerg. Telecommun. Technol..
[3] Yaser Jararweh,et al. Trustworthy and sustainable smart city services at the edge , 2020 .
[4] Tim Good,et al. A holistic approach examining RFID design for security and privacy , 2010, The Journal of Supercomputing.
[5] Eila Ovaska,et al. Context-awareness in smart spaces , 2010, The IEEE symposium on Computers and Communications.
[6] Roy H. Campbell,et al. Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[7] Kashif Saleem,et al. Efficient low cost supervisory system for Internet of Things enabled smart home , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[8] Ali Kashif Bashir,et al. Internet of Threats and Context Aware Security: Part Two , 2017 .
[9] Mahdi Aiash,et al. Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[10] M. Shamim Hossain,et al. Semantic Multimedia Fog Computing and IoT Environment: Sustainability Perspective , 2018, IEEE Communications Magazine.
[11] Jadwiga Indulska,et al. A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Minglu Li,et al. Context-adaptive and energy-efficient mobile transaction management in pervasive environments , 2009, The Journal of Supercomputing.
[14] Junaid Shuja,et al. Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs , 2018, Concurr. Comput. Pract. Exp..
[15] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[16] Svetlana Kim,et al. MRTensorCube: tensor factorization with data reduction for context-aware recommendations , 2017, The Journal of Supercomputing.
[17] Mehmet A. Orgun,et al. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art , 2018, Telematics Informatics.
[18] Lewis Tseng,et al. Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry , 2020, Computer.
[19] Diane J. Cook,et al. Pervasive computing at scale: Transforming the state of the art , 2012, Pervasive Mob. Comput..
[20] Benjamin C. M. Fung,et al. Security and privacy challenges in smart cities , 2018 .
[21] Kun Gao,et al. Research on social network discovery algorithm in pervasive sensing environment , 2016, Concurr. Comput. Pract. Exp..
[22] Byung-Gyu Kim,et al. Reducing Security Overhead to Enhance Service Delivery in Jini IoT , 2015, Int. J. Distributed Sens. Networks.
[23] Schahram Dustdar,et al. Data Quality Observation in Pervasive Environments , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[24] Janet Light,et al. Context-Aware Data Association and Authenticity in Pervasive Healthcare , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[25] L. Jean Camp,et al. Aging, Privacy, and Home-Based Computing: Developing a Design Framework , 2012, IEEE Pervasive Computing.
[26] Paramvir Bahl,et al. Advancing the state of mobile cloud computing , 2012, MCS '12.
[27] Simon Elias Bibri,et al. The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability , 2018 .
[28] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[29] Claudio Bettini,et al. Privacy protection in pervasive systems: State of the art and technical challenges , 2015, Pervasive Mob. Comput..
[30] Sajal K. Das,et al. Adaptive and context-aware privacy preservation exploiting user interactions in smart environments , 2014, Pervasive Mob. Comput..
[31] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[32] Muhammad Imran,et al. A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems , 2018, IEEE Access.
[33] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[34] Carles Gomez,et al. Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2012, Sensors.
[35] In Lee,et al. The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model , 2019, Internet Things.
[36] Jalal Al-Muhtadi,et al. ConSec: Context-Aware Security Framework for Smart Spaces , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[37] Muhammad Imran,et al. Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..
[38] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[39] Mohammad Sayad Haghighi,et al. Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[40] Thar Baker,et al. Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.
[41] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[42] Roy H. Campbell,et al. A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[43] Pascal Lorenz,et al. Security Model for Pervasive Multimedia Environment , 2014 .
[44] Jiannong Cao,et al. Application mobility in pervasive computing: A survey , 2013, Pervasive Mob. Comput..
[45] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[46] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[47] Mamoun Alazab,et al. A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.
[48] Uwe Hansmann,et al. Pervasive Computing Handbook , 2001, Springer Berlin Heidelberg.
[49] Yu Liu,et al. Pervasive location acquisition technologies: Opportunities and challenges for geospatial studies , 2012, Comput. Environ. Urban Syst..
[50] InJung Kim,et al. National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment , 2017, The Journal of Supercomputing.
[51] Nadjib Badache,et al. Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..
[52] Ben Bradford,et al. Security and the smart city: A systematic review , 2020 .
[53] Abdelouahid Derhab,et al. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..
[54] Kashif Saleem,et al. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.
[55] Victor C. M. Leung,et al. A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.