暂无分享,去创建一个
[1] Vangelis Metsis,et al. IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.
[2] Yuxi Liu,et al. Key Technologies and Applications of Internet of Things , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.
[3] Lyman Chapin,et al. THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .
[4] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[5] Zhao Ling. Research on application of Internet of Things in teaching practice of security technique defense , 2013, IOT 2013.
[6] Dhananjay Singh,et al. A survey of Internet-of-Things: Future vision, architecture, challenges and services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[7] M. A. Faruque. Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .
[8] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[9] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[10] Antonio Iera,et al. Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm , 2017, Ad Hoc Networks.
[11] Mainak Mukherjee,et al. A Vision of IoT: Applications, Challenges, and Opportunities with Dehradun Perspective , 2017 .
[12] Murad Khan,et al. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .
[13] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[14] Zahid Ullah,et al. Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.
[15] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[16] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[17] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[18] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[19] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[20] Fariborz Entezami,et al. A Case Study of Internet of Things Using Wireless Sensor Networks and Smartphones , .
[21] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[22] Shaik Khasim Saheb,et al. Design of Architecture for Efficient Integration of Internet of Things and Cloud Computing , 2017 .
[23] Wenyao Xu,et al. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.
[24] Stefan Mangard,et al. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices , 2016, IEEE Communications Surveys & Tutorials.
[25] Rajkumar Buyya,et al. Internet of Things: An Overview , 2017, ArXiv.
[26] Louis Coetzee,et al. The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.
[27] Arquimedes Canedo,et al. Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[28] Wang Fang,et al. A research on experimental system for Internet of Things major and application project , 2012, 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization.