Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology
暂无分享,去创建一个
[1] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[2] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[3] Xiao Ren. Artificial Immune System: Principle, Models, Analysis and Perspectives , 2002 .
[4] A. Karygicmnis,et al. RFID Security: A Taxonomy of Risk , 2006, 2006 First International Conference on Communications and Networking in China.
[5] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[6] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[7] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[8] Sencun Zhu,et al. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[9] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[10] Sheng-Yuan Wang,et al. Survey of Information Security Risk Assessment , 2010, 2010 International Conference on Electrical and Control Engineering.
[11] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[12] M. Eloff,et al. Internet of things: emerging and future scenarios from an information security perspective , 2009 .
[13] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[14] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[15] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[16] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[17] Zhang Yu-qing. Survey of information security risk assessment , 2004 .
[18] Song Chen. A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security , 2005 .