Adopting cyber security practices in Internet of Things: a review
暂无分享,去创建一个
[1] Vinay Soni,et al. Detecting Sinkhole Attack in Wireless Sensor Network , 2013 .
[2] Sergey Andreev,et al. Internet of Things, Smart Spaces, and Next Generation Networking , 2013, Lecture Notes in Computer Science.
[3] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[4] Jörg Daubert,et al. On the Security and Privacy of Internet of Things Architectures and Systems , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).
[5] Munam Ali Shah,et al. IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).
[6] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[7] Guangyi Xiao,et al. User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.
[8] Panwit Tuwanut,et al. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).
[9] W. Marsden. I and J , 2012 .
[10] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[11] Zhanyang Xu,et al. A Density-based Energy-efficient Clustering Algorithm for Wireless Sensor Networks , 2013 .
[12] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[13] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[14] Martin Bauer,et al. Proceedings of the Federated Conference on Computer Science and Information Systems pp. 949–955 ISBN 978-83-60810-22-4 Service Modelling for the Internet of Things , 2022 .
[15] Sapna Chaudhary,et al. Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .
[16] Paulo Veríssimo,et al. Fundamental Security Concepts , 2001 .
[17] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[18] Chen Wei,et al. Security Characteristic and Technology in the Internet of Things , 2010 .
[19] M. Alizadeh,et al. Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID , 2012 .
[20] Tsuyoshi Murata,et al. {m , 1934, ACML.
[21] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.
[22] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[23] Raj Kulkarni,et al. Internet of Things: Architecture and Security , 2014 .
[24] Hyunsoo Yoon,et al. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..
[25] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[26] Rakesh R. Bhavsar,et al. Data Security over Cloud , 2012 .
[27] P. V. Dhawas,et al. A Secured Cost Effective Multi-Cloud Storage in Cloud Computing , 2013 .
[28] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[29] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[30] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[31] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.