IoT Security, Privacy, Safety and Ethics
暂无分享,去创建一个
[1] Pritee Parwekar,et al. Detection of Sinkhole Attack in Wireless Sensor Network , 2016 .
[2] Ricardo Neisse,et al. Ethical Design in the Internet of Things , 2016, Science and Engineering Ethics.
[3] Saleem Ullah,et al. Security Issues in the Internet of Things (IoT): A Comprehensive Study , 2017 .
[4] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[5] Hany F. Atlam,et al. Integration of Color and Texture Features in CBIR System , 2017 .
[6] Gary B. Wills,et al. Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .
[7] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[8] Aman Waqas. Modeling Adaptive Security in IoT Driven eHealth , 2013 .
[9] Gary B. Wills,et al. An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things , 2017, IoTBDS.
[10] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[11] Gary B. Wills,et al. Internet of Nano Things: Security Issues and Applications , 2018, ICCBDC.
[12] Tajana Simunic,et al. Scalable-Application Design for the IoT , 2017, IEEE Software.
[13] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[14] Carsten Maple,et al. Security and privacy in the internet of things , 2017 .
[15] Gary B. Wills,et al. Integration of Cloud Computing with Internet of Things: Challenges and Open Issues , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[16] Max Senges,et al. IoT Safety and Security as Shared Responsibility , 2016 .
[17] Radha Shankarmani,et al. Architecture for Internet of Things to minimize human intervention , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[18] Gary B. Wills,et al. XACML for Building Access Control Policies in Internet of Things , 2018, IoTBDS.
[19] Marek Neruda,et al. Software Implementation of Secure Firmware Update in IoT Concept , 2017 .
[20] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[21] Klaus Wehrle,et al. Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.
[22] Mircea Georgescu,et al. INTERNET OF THINGS – SOME ETHICAL ISSUES , 2013 .
[23] Honorio Martín,et al. An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms , 2014, IEEE Transactions on Industrial Informatics.
[24] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[25] Gary B. Wills,et al. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[26] Robert John Walters,et al. Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues , 2018, International Journal of Intelligent Computing Research.
[27] Gary B. Wills,et al. Intelligence of Things: Opportunities & Challenges , 2018, 2018 3rd Cloudification of the Internet of Things (CIoT).
[28] Lida Xu,et al. CLOUDQUAL: A Quality Model for Cloud Services , 2014, IEEE Transactions on Industrial Informatics.
[29] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[30] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[31] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[32] Madini O. Alassafi,et al. Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.
[33] R. Kitchin,et al. The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention , 2019, Smart Cities and Innovative Urban Technologies.
[34] Yijun Yu,et al. Goal Modelling for Security Problem Matching and Pattern Enforcement , 2017, Int. J. Secur. Softw. Eng..
[35] Magdy A. Bayoumi,et al. A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches , 2017 .
[36] Sherali Zeadally,et al. Cybersecurity and Privacy Solutions in Smart Cities , 2017, IEEE Communications Magazine.
[37] Marilyn Wolf,et al. Safety and Security of Cyber-Physical and Internet of Things Systems [Point of View] , 2017, Proc. IEEE.
[38] Nawal A. El-Fishawy,et al. Comparative Study on CBIR based on Color Feature , 2013, International Journal of Computer Applications.
[39] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[40] Gary B. Wills,et al. The Impact of Cloud Forensic Readiness on Security , 2017, CLOSER.
[41] Robert John Walters,et al. Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..
[42] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[43] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[44] Gary B. Wills,et al. Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing , 2017 .
[45] Karen Renaud,et al. Privacy of the Internet of Things: A Systematic Literature Review , 2016, HICSS.
[46] Mansoor Ahmed,et al. Smart Cities: A Survey on Security Concerns , 2016 .