Towards a reliable smart city through formal verification and network analysis
暂无分享,去创建一个
[1] Ramjee Prasad,et al. Impact of 5G Technologies on Smart City Implementation , 2018, Wireless Personal Communications.
[2] Fadi Al-Turjman,et al. A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.
[3] Samir Ouchani,et al. Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.
[4] Xavier Masip-Bruin,et al. A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration , 2018, ACM Comput. Surv..
[5] Victor I. Chang,et al. NMCDA: A framework for evaluating cloud computing services , 2018, Future Gener. Comput. Syst..
[6] Stephen H. Hallett,et al. Towards evaluation design for smart city development , 2019 .
[7] Marijn Janssen,et al. A Unified Smart City Model (USCM) for Smart City Conceptualization and Benchmarking , 2016, Int. J. Electron. Gov. Res..
[8] Taewon Kang,et al. Practical Simplified Indoor Multiwall Path-Loss Model , 2020, 2020 20th International Conference on Control, Automation and Systems (ICCAS).
[9] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[10] Muhannad Quwaider,et al. Performance evaluation and enhancement of VLAN via wireless networks using OPNET modeler , 2020, ArXiv.
[11] Andrea Zanella,et al. Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.
[12] Yassine Sadqi,et al. A New Mutuel Kerberos Authentication Protocol for Distributed Systems , 2017, Int. J. Netw. Secur..
[13] Rajesh Gupta,et al. Brick : Metadata schema for portable smart building applications , 2018, Applied Energy.
[14] Kyungbaek Kim,et al. Design and implementation of intrusion detection system using convolutional neural network for DoS detection , 2018, ICMLSC '18.
[15] Akis Kokkinis,et al. On the Realistic Radio and Network Planning of IoT Sensor Networks , 2019, Sensors.
[16] Helena Rifà-Pous,et al. Attack Classification Schema for Smart City WSNs , 2017, Sensors.
[17] Evangelos Theodoridis,et al. SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.
[18] Eirini Anthi,et al. Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment , 2019 .
[19] Z. Allam,et al. Redefining the Smart City: Culture, Metabolism and Governance , 2018, Smart Cities.
[20] Joeri de Ruiter,et al. Analysis of DTLS Implementations Using Protocol State Fuzzing , 2020, USENIX Security Symposium.
[21] Jens Bo Holm-Nielsen,et al. A Comprehensive Review on Renewable Energy Development, Challenges, and Policies of Leading Indian States With an International Perspective , 2020, IEEE Access.
[22] D. S. Vijayan,et al. Automation systems in smart buildings: a review , 2020 .
[23] M. K. Anser. Impact of energy consumption and human activities on carbon emissions in Pakistan: application of STIRPAT model , 2019, Environmental Science and Pollution Research.
[24] Bhagya Nathali Silva,et al. Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities , 2018 .
[25] Paul P. Maglio,et al. Data-Driven Understanding of Smart Service Systems Through Text Mining , 2018, Service Science.
[26] Pavlo Skladannyi,et al. ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE , 2019 .
[27] Kim-Kwang Raymond Choo,et al. A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks , 2020, IEEE Access.
[28] Amir Masoud Rahmani,et al. Reliability and high availability in cloud computing environments: a reference roadmap , 2018, Human-centric Computing and Information Sciences.
[29] Weihua Duan,et al. Smart City Concepts and Dimensions , 2019, ICIT.
[30] V Anantha Narayanan,et al. An Overview of Security in CoAP: Attack and Analysis , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).
[31] Yasir Mehmood,et al. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.
[32] C. Toh. Security for smart cities , 2020, IET Smart Cities.
[33] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[34] Yunzhe Li,et al. The design of hardware firewall based on Acorn RISC Machine , 2021 .
[35] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[36] Helen D. Karatza,et al. Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark , 2017, J. Syst. Softw..
[37] Felix Klaedtke,et al. A Security Architecture for 5G Networks , 2018, IEEE Access.
[38] Bayan Mahdi Sabbar,et al. An overview on wireless sensor networks and finding optimal location of nodes , 2019, Periodicals of Engineering and Natural Sciences (PEN).
[39] Subhas Mukhopadhyay,et al. WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings , 2015, Sensors.
[40] Yeqiong Song,et al. Using Cooja for WSN Simulations: Some New Uses and Limits , 2016, EWSN.
[41] Sherif El-Kassas,et al. Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile , 2018, SecITC.
[42] Thomas Morris,et al. On the Edge Realtime Intrusion Prevention System for DoS Attack , 2018 .
[43] M. Destek,et al. Renewable, non-renewable energy consumption, economic growth, trade openness and ecological footprint: Evidence from organisation for economic Co-operation and development countries , 2020, Journal of Cleaner Production.
[44] Min Zhang,et al. Architecture Design of Datacenter for Cloud English Education Platform , 2019, Int. J. Emerg. Technol. Learn..
[45] Leila Ben Saad,et al. Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies , 2011 .
[46] Simon Elias Bibri,et al. The eco-city and its core environmental dimension of sustainability: green energy technologies and their integration with data-driven smart solutions , 2020, Energy Inform..
[47] Yang Yu,et al. Technology of short-distance wireless communication and its application based on equipment support , 2018 .
[48] Didier Lime,et al. TCTL Model Checking Lower/Upper-Bound Parametric Timed Automata Without Invariants , 2018, FORMATS.
[49] Sajjad Hussain Chauhdary,et al. A Novel Framework and Enhanced QoS Big Data Protocol for Smart City Applications , 2018, Sensors.
[50] Arif Mahmud,et al. Simulation and Comparison of RPL, 6LoWPAN, and CoAP Protocols Using Cooja Simulator , 2018, IJCCI.
[51] Catherine A. Meadows,et al. Model Checking Security Protocols , 2018, Handbook of Model Checking.
[52] Jin Kwak,et al. Smart card-based secure authentication protocol in multi-server IoT environment , 2017, Multimedia Tools and Applications.
[53] Ansari Saleh Ahmar,et al. Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA , 2019, ArXiv.
[54] Hiroyuki Koga,et al. Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing , 2017, IEICE Trans. Inf. Syst..
[55] Nitin Naik,et al. Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP , 2017, 2017 IEEE International Systems Engineering Symposium (ISSE).
[56] Saraju P. Mohanty,et al. Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..
[57] Alireza Ejlali,et al. Objective function: A key contributor in Internet of Things primitive properties , 2018, 2018 Real-Time and Embedded Systems and Technologies (RTEST).
[58] Sajeeb Saha,et al. Application specific tunneling protocol selection for Virtual Private Networks , 2017, 2017 International Conference on Networking, Systems and Security (NSysS).
[59] Tuan Anh Nguyen,et al. A Hierarchical Modeling and Analysis Framework for Availability and Security Quantification of IoT Infrastructures , 2020 .