Review of Analysis on IoT Components, Devices and Layers Security
暂无分享,去创建一个
[1] Izzat Alsmadi,et al. The malware detection challenge of accuracy , 2016, 2016 2nd International Conference on Open Source Software Computing (OSSCOM).
[2] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[3] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[4] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[5] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[6] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[7] Stefan Mangard,et al. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices , 2016, IEEE Communications Surveys & Tutorials.
[8] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[9] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[10] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[11] Jinquan Zeng,et al. Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.
[12] Lavinia Nastase,et al. Security in the Internet of Things: A Survey on Application Layer Protocols , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).
[13] Nikita Chavhan,et al. False Data Detection in Wireless Sensor Network with Secure communication , 2011 .
[14] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[15] Muhammad Imran Malik,et al. XMPP architecture and security challenges in an IoT ecosystem , 2018 .
[16] Sapna Chaudhary,et al. Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .
[17] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[18] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[19] Liu Yang,et al. Research on Security Issues of the Internet of Things , 2013 .
[20] Ioannis Chatzigiannakis,et al. A privacy-preserving smart parking system using an IoT elliptic curve based security platform , 2016, Comput. Commun..
[21] Thomas Kunz,et al. Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).
[22] Weizhe Zhang,et al. Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .
[23] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[24] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[25] Resul Das,et al. A comparison of cyber-security oriented testbeds for IoT-based smart grids , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).