Security Implementation and Verification in Smart Buildings
暂无分享,去创建一个
[1] Arnold Janssens,et al. Effect of moisture inertia models on the predicted indoor humidity in a room , 2005 .
[2] C. Lakshmi Devasena. IPv6 Low Power Wireless Personal Area Network (6LoWPAN) for Networking Internet of Things (IoT) – Analyzing its Suitability for IoT , 2016 .
[3] Vidyasagar Potdar,et al. Energy conservation in a smart home , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[4] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[5] Pramod Anantharam,et al. Semantic Gateway as a Service Architecture for IoT Interoperability , 2014, 2015 IEEE International Conference on Mobile Services.
[6] António Manuel Santos Pascoal,et al. Optimal Sensor Placement for Multiple Target Positioning with Range-Only Measurements in Two-Dimensional Scenarios , 2013, Sensors.
[7] Andrea Zanella,et al. Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.
[8] Evangelos Theodoridis,et al. SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.
[9] Xi Wang,et al. Design and Implementation of Push Notification System Based on the MQTT Protocol , 2013, ISCA 2013.
[10] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[11] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[12] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[13] Robert J. Piechocki,et al. On Predicting the Battery Lifetime of IoT Devices: Experiences from the SPHERE Deployments , 2018, RealWSN@SenSys.
[14] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[15] Thomas Kunz,et al. Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).
[16] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[17] Jean-François Blanchette. The digital signature dilemma Le dilemme de la signature numérique , 2006 .
[18] Jürgen Schönwälder,et al. Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.
[19] Eui-nam Huh,et al. Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[20] E. Spyrou,et al. Creating a Smart Room using an IoT approach , 2016 .
[21] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[22] Olga Galinina,et al. Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap , 2015, IEEE Communications Magazine.
[23] Guangyi Xiao,et al. User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.
[24] Samir Ouchani,et al. Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.
[25] Sergey Balandin,et al. Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges , 2013, NEW2AN.
[26] Avishai Wool,et al. A quantitative study of firewall configuration errors , 2004, Computer.