Using Clustering for Forensics Analysis on Internet of Things
暂无分享,去创建一个
[1] Alessandro Neri,et al. Design and implementation of a mediation system enabling secure communication among Critical Infrastructures , 2012, Int. J. Crit. Infrastructure Prot..
[2] Mizanur Rahman,et al. IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions , 2019, Int. J. Cloud Appl. Comput..
[3] Mirza Mohd. Sufyan Beg,et al. Using Vehicles as Fog Infrastructures for Transportation Cyber-Physical Systems (T-CPS): Fog Computing for Vehicular Networks , 2019, Int. J. Softw. Sci. Comput. Intell..
[4] Brij B. Gupta,et al. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..
[5] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[6] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[7] Sanjay P. Ahuja,et al. Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications , 2020, Int. J. Cloud Appl. Comput..
[8] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[9] A. P. Pljonkin,et al. Vulnerability of the Synchronization Process in the Quantum Key Distribution System , 2019, Int. J. Cloud Appl. Comput..
[10] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[11] Dharma P. Agrawal,et al. Choices for interaction with things on Internet and underlying issues , 2015, Ad Hoc Networks.
[12] Mohammed Ouzzif,et al. A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..
[13] Ammar Almomani,et al. Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud , 2018, Int. J. Cloud Appl. Comput..
[14] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[15] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[16] Zhong Fan,et al. Emerging technologies and research challenges for 5G wireless networks , 2014, IEEE Wireless Communications.
[17] Charu Gandhi,et al. Ensure Hierarchal Identity Based Data Security in Cloud Environment , 2019, Int. J. Cloud Appl. Comput..
[18] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[19] N. Koblitz. Elliptic curve cryptosystems , 1987 .