Survey on Internet of Things (IoT) security issues & solutions
暂无分享,去创建一个
[1] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[2] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[3] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[4] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[5] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[6] Xinyu Yang,et al. Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[7] Raj Kulkarni,et al. Internet of Things: Architecture and Security , 2014 .
[8] Chen Wei,et al. Security Characteristic and Technology in the Internet of Things , 2010 .
[9] Ayman I. Kayssi,et al. IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[10] Shancang Li. Security Architecture in the Internet of Things , 2017 .
[11] Xiao Feng Wang,et al. Research on Security Issues of the Internet of Things , 2014, CIT 2014.
[12] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[13] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[14] Xun Wang,et al. Detecting worms via mining dynamic program execution , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[15] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[16] Panwit Tuwanut,et al. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).
[17] Yassine Maleh,et al. A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.
[18] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[19] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[20] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[21] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .
[22] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[23] Xinyu Yang,et al. A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, IEEE Transactions on Computers.
[24] Shuang-Hua Yang,et al. RFID Sensor Network Network Architectures to Integrate RFID, Sensor and WSN , 2007 .
[25] Sapna Chaudhary,et al. Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .
[26] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[27] Rinju Ravindran. IoT : A REVIEW ON SECURITY ISSUES AND MEASURES , 2015 .