Identification of IoT Actors
暂无分享,去创建一个
[1] Yuan Tian,et al. A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment , 2020, Secur. Commun. Networks.
[2] Wolfie Christl,et al. Corporate Surveillance In Everyday Life. How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions , 2017 .
[3] Jason P. Jue,et al. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .
[4] Christoph Grimm,et al. An Introduction to the Internet of Things , 2020, IoT Platforms, Use Cases, Privacy, and Business Models.
[5] S. Kanimozhi Suguna,et al. Applications of the Internet of Things with the Cloud Computing Technologies: A Review , 2019 .
[6] Gyu Myoung Lee,et al. Personal Data Trading Scheme for Data Brokers in IoT Data Marketplaces , 2019, IEEE Access.
[7] E. Ronco,et al. The enhanced Telecom Operations Map™ (eTOM) Business Process Framework , 2002 .
[8] Brenda Leticia Flores Ríos,et al. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains , 2017, Sensors.
[9] Gibson B. N. Barbosa,et al. The Internet of Things: Definitions, Key Concepts, and Reference Architectures , 2020, The Cloud-to-Thing Continuum.
[10] Ivana Podnar Žarko,et al. A Regulatory View on Smart City Services , 2019, Sensors.
[11] K. Scarfone,et al. IoT device cybersecurity capability core baseline , 2020 .
[12] K. Scarfone,et al. Foundational cybersecurity activities for IoT device manufacturers , 2020 .
[13] Partha Pratim Ray,et al. An Introduction to Dew Computing: Definition, Concept and Implications , 2018, IEEE Access.
[14] Sotiris Karabetsos,et al. A Review of Machine Learning and IoT in Smart Transportation , 2019, Future Internet.
[15] Dawood Al-Abri,et al. Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns , 2019, International Journal of Advanced Computer Science and Applications.
[16] Marjan Gusev,et al. Dew Computing and Transition of Internet Computing Paradigms , 2019 .
[17] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[18] Soumya Kanti Datta,et al. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).
[19] Zhou Cheng,et al. Overview of the Internet of Things , 2011 .
[20] Jerome Henry,et al. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things , 2017 .
[21] Zheng Li,et al. An Introduction and Comparison of the Application of Cloud and Fog in IoT , 2019 .
[22] Fernando Boavida,et al. Opportunistic fog computing: Feasibility assessment and architectural proposal , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[23] Karolj Skala,et al. Views on the role and importance of dew computing in the service and control technology , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[24] Matt Cicciari. The internet of word-things , 2016 .
[25] Rajkumar Buyya,et al. Feasibility of Fog Computing , 2017, Scalable Computing and Communications.
[26] Mufti Mahmud,et al. Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things , 2019, IEEE Internet of Things Journal.
[27] Gyu Myoung Lee,et al. Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets , 2020, IEEE Internet of Things Journal.
[28] Shuchi Sinha,et al. Analysis of Stakeholders Within IoT Ecosystem , 2018 .
[29] R. Posner. The Federal Trade Commission , 1969 .