Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
暂无分享,去创建一个
Muhammad Shafiq | Muhammad Hamza | Ali Mahmoud Baddour | M. Shafiq | Muhammad Azeem Akbar | Tahir Kamal | A. Baddour | Muhammad Hamza | M. Akbar | Tahir Kamal
[1] Muhammad Azeem Akbar,et al. Estimating software reliability in maintenance phase through ann and statistics , 2016, ArXiv.
[2] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[3] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[4] Sherali Zeadally,et al. IoT technologies for smart cities , 2018, IET Networks.
[5] Ahmed Mateen,et al. Comparative analysis of wireless sensor networks with wireless multimedia sensor networks , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).
[6] Muhammad Shafiq,et al. AZ-Model of software requirements change management in global software development , 2018, 2018 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube).
[7] Arif Ali Khan,et al. Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model , 2018, IEEE Access.
[8] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[9] Al-Sakib Khan Pathan,et al. Smart Grid Internet of Things , 2017, Journal on spesial topics in mobile networks and applications.
[10] Sakir Sezer,et al. Embedded Policing and Policy Enforcement Approach for Future Secure IoT Technologies , 2018, IoT 2018.
[11] Carsten Maple,et al. Security and privacy in the internet of things , 2017 .
[12] Arif Ali Khan,et al. Effect of Project Management in Requirements Engineering and Requirements Change Management Processes for Global Software Development , 2018, IEEE Access.
[13] H. Hashim,et al. A lightweight and secure TFTP protocol for smart environment , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[14] Yong Ho Hwang. IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.
[15] Hong Xiang,et al. Reversible data hiding in compressed and encrypted images by using Kd-tree , 2018, Multimedia Tools and Applications.
[16] Waheed Ur Rehman,et al. The Deep Neural Network Based Classification of Fingers Pattern Using Electromyography , 2018, 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC).
[17] Nick Feamster,et al. User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..
[18] Azizol Abdullah,et al. A Survey on Sybil Attack Detection in Vehicular ad hoc Networks (VANET) , 2018 .
[19] Arif Ali Khan,et al. Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model , 2018, IEEE Access.
[20] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[21] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[22] Ahmed Mateen,et al. Robust approaches, techniques and tools for requirement engineering in agile development , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).
[23] Praveen Kumar,et al. Health Monitoring & Management using IoT devices in a Cloud Based Framework , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[24] Mohammad Shameem,et al. Investigation of Project Administration related challenging factors of Requirements Change Management in global software development: A systematic literature review , 2018, 2018 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube).
[25] Ilsun You,et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things , 2014, Future Gener. Comput. Syst..
[26] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[27] Junhao Wen,et al. The Role of Hyperspectral Imaging: A Literature Review , 2018 .
[28] Muhammad Azeem,et al. AZ Model for Software Development , 2016, ArXiv.
[29] Maurizio A. Spirito,et al. The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[30] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.