Privacy Information Security Classification for Internet of Things Based on Internet Data
暂无分享,去创建一个
Qi Li | Pan Hui | Xiaofeng Lu | Zhaowei Qu | P. Hui | Xiaofeng Lu | Qi Li | Zhaowei Qu
[1] Christoph P. Mayer. Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .
[2] Helen Gill,et al. Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Mechatronics (ICM).
[3] Jingsha He,et al. Secure Localization in Wireless Sensor Networks with Mobile Beacons , 2012, Int. J. Distributed Sens. Networks.
[4] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[5] Geoff Mulligan,et al. The Internet of Things: Here Now and Coming Soon , 2010 .
[6] Srijith Krishnan Nair,et al. Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.
[7] Liu Yuan. Privacy and Security in the Exploitation of Internet of Things , 2011 .
[8] Lui Sha,et al. Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[9] Michael J. Corby. The Case for Privacy , 2007, Information Security Management Handbook, 6th ed..
[10] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[11] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[12] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[13] Ian Goldberg,et al. A pseudonymous communications infrastructure for the internet , 2000 .
[14] Qi Li,et al. Privacy Information Security Classification Study in Internet of Things , 2014, 2014 International Conference on Identification, Information and Knowledge in the Internet of Things.
[15] Deborah Estrin,et al. Internet Predictions , 2010, IEEE Internet Comput..
[16] Kevin Aquilina,et al. Public security versus privacy in technology law: A balancing act? , 2010, Comput. Law Secur. Rev..