Securing Internet of Things (IoT) Through an Adaptive Framework
暂无分享,去创建一个
Umer Farooq | Imran Baig | Najam Ul Hasan | I. Baig | U. Farooq | N. Hasan
[1] Chetana Prakash,et al. Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[2] Shivaji Kulkarni,et al. Internet of Things (IoT) security , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[3] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[4] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[6] Hassan Salmani,et al. Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion , 2016, IEEE Transactions on Information Forensics and Security.
[7] Susmita Sur-Kolay,et al. Physiological Information Leakage: A New Frontier in Health Information Security , 2016, IEEE Transactions on Emerging Topics in Computing.
[8] M. Bernardine Dias,et al. The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs , 2007 .
[9] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[10] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[11] Jeremy Hilton,et al. A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.
[12] Meng Zhang,et al. Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.
[13] Meng Zhang,et al. Emerging Frontiers in Embedded Security , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.
[14] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[15] Umer Farooq,et al. Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA , 2017, J. King Saud Univ. Comput. Inf. Sci..