IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats
暂无分享,去创建一个
Nigel Davies | Mike Harding | Ludwig Trotter | Mateusz Mikusz | N. Davies | Mateusz Mikusz | Mike Harding | Ludwig Trotter
[1] Barbara Kitchenham,et al. Procedures for Performing Systematic Reviews , 2004 .
[2] Frank Stajano,et al. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure , 2010, Ad Hoc Networks.
[3] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[4] Subir Biswas,et al. Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety , 2006, IEEE Communications Magazine.
[5] Steven Burns. Threat Modeling: A Process To Ensure Application Security , 2018 .
[6] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[7] Arnold Picot,et al. Reflections on societal and business model transformation arising from digitization and big data analytics: A research agenda , 2015, J. Strateg. Inf. Syst..
[8] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[9] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[10] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[11] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.