IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System
暂无分享,去创建一个
Alireza Ahrary | Noriko Horibe | R. Dennis A. Ludena | Won Seok Yang | Noriko Horibe | W. Yang | A. Ahrary | Dennis A. Ludena R
[1] Patrick Gage Kelley,et al. IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network , 2010 .
[2] Krish Krishnan,et al. Introduction to Big Data , 2013 .
[3] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[4] D. Boyd,et al. Six Provocations for Big Data , 2011 .
[5] P. Balamuralidhar,et al. Towards a Light Weight Internet ofThings Platform Architecture , 2013 .
[6] L. Manovich,et al. Trending: The Promises and the Challenges of Big Social Data , 2012 .
[7] Habtamu Abie,et al. Metrics-driven security objective decomposition for an e-health application with adaptive security management , 2013, ASPI '13.
[8] Rahul Bhattacharyya,et al. Beyond the ID in RFID , 2010 .
[9] Atsushi Hashimoto,et al. Advanced application of ICT to the sustainable production of excellent Japanese Mandarin , 2010 .
[10] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[11] Alexandros Labrinidis,et al. Challenges and Opportunities with Big Data , 2012, Proc. VLDB Endow..
[12] Alireza Ahrary,et al. Big Data approach in an ICT Agriculture project , 2013, 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013).
[13] Bruno Latour,et al. Tarde's idea of quantification , 2010 .
[14] James Mussell. Raw Data is an Oxymoron , 2014 .
[15] Yoshinori Yaginuma,et al. Approaches to Creating Human-Centric Solutions , 2012 .
[16] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[17] Alireza Ahrary,et al. A Big Data Approach for a New ICT Agriculture Application Development , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[18] Luca Veltri,et al. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.
[19] Sean D Dessureault,et al. Understanding big data , 2016 .
[20] Alireza Ahrary,et al. Big data approach to a novel nutrition-based vegetable production and distribution system , 2013, 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM).
[21] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[22] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[23] Adam Jacobs,et al. The pathologies of big data , 2009, Commun. ACM.
[24] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[25] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[26] Emily Troshynski,et al. Accountabilities of presence: reframing location-based systems , 2008, CHI.
[27] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[28] P. Balamuralidhar,et al. Towards a LightWeight Internet of Things Platform Architecture , 2013, J. ICT Stand..
[29] Daeyoung Kim,et al. The EPC Sensor Network for RFID and WSN Integration Infrastructure , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).