Internet of things security
暂无分享,去创建一个
Abdelmalek Azizi | Yassine Chahid | Mohamed Benabdellah | A. Azizi | Yassine Chahid | M. Benabdellah
[1] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[2] A. Laurie. RFID: Practical attacks against RFID , 2007 .
[3] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[4] Antonio F. Gómez-Skarmeta,et al. HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management , 2009, 2009 International Conference on Computational Science and Engineering.
[5] Yu Teng-wei. Design of security and defense system for home based on Internet of things , 2010 .
[6] Florian Michahelles,et al. Architecting the Internet of Things , 2011 .
[7] Ying Zhang,et al. Technology framework of the Internet of Things and its application , 2011, 2011 International Conference on Electrical and Control Engineering.
[8] Brent Kesler,et al. The Vulnerability of Nuclear Facilities to Cyber Attack; Strategic Insights: Spring 2010 , 2011 .
[9] Gao Hong-b. Study of the application for the security state assessment about the internet of things based on grey correlation algorithm , 2012 .
[10] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[11] Mohammad Ali Nematbakhsh,et al. EVOLUTION OF THE WORLD WIDE WEB : FROM WEB 1.0 TO WEB 4.0 , 2012 .
[12] Zhihua Li,et al. A Multi-layer Security Model for Internet of Things , 2012 .
[13] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[14] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[15] Weizhe Zhang,et al. Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .
[16] Erik Poll,et al. Using Trusted Execution Environments in Two-factor Authentication: comparing approaches , 2013, Open Identity Summit.
[17] Raj Kulkarni,et al. Internet of Things: Architecture and Security , 2014 .
[18] Nabil Kannouf,et al. Security on RFID technology , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[19] T. Sudhir,et al. Spoofing Attack Detection Wireless Networks using Advanced KNN , 2016 .