Using Clustering for Forensics Analysis on Internet of Things

[1]  Alessandro Neri,et al.  Design and implementation of a mediation system enabling secure communication among Critical Infrastructures , 2012, Int. J. Crit. Infrastructure Prot..

[2]  Mizanur Rahman,et al.  IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions , 2019, Int. J. Cloud Appl. Comput..

[3]  Mirza Mohd. Sufyan Beg,et al.  Using Vehicles as Fog Infrastructures for Transportation Cyber-Physical Systems (T-CPS): Fog Computing for Vehicular Networks , 2019, Int. J. Softw. Sci. Comput. Intell..

[4]  Brij B. Gupta,et al.  Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..

[5]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[6]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[7]  Sanjay P. Ahuja,et al.  Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications , 2020, Int. J. Cloud Appl. Comput..

[8]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[9]  A. P. Pljonkin,et al.  Vulnerability of the Synchronization Process in the Quantum Key Distribution System , 2019, Int. J. Cloud Appl. Comput..

[10]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[11]  Dharma P. Agrawal,et al.  Choices for interaction with things on Internet and underlying issues , 2015, Ad Hoc Networks.

[12]  Mohammed Ouzzif,et al.  A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..

[13]  Ammar Almomani,et al.  Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud , 2018, Int. J. Cloud Appl. Comput..

[14]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[15]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[16]  Zhong Fan,et al.  Emerging technologies and research challenges for 5G wireless networks , 2014, IEEE Wireless Communications.

[17]  Charu Gandhi,et al.  Ensure Hierarchal Identity Based Data Security in Cloud Environment , 2019, Int. J. Cloud Appl. Comput..

[18]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[19]  N. Koblitz Elliptic curve cryptosystems , 1987 .