Vehicle Theft Identification and Intimation Using GSM & IOT
暂无分享,去创建一个
M Eswar Kumar | G. Thippa Reddy | K Sudheer | M. Praveen Kumar Reddy | Rajesh Kaluri | Dharmendra Singh Rajput | Kuruva Lakshmanna | G. T. Reddy | M. Kumar | D. Rajput | Rajesh Kaluri | K. Sudheer | Kuruva Lakshmanna | M. P. K. Reddy
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] Paul Baybutt. Assessing risks from threats to process plants: Threat and vulnerability analysis , 2002 .
[3] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[4] Ramjee Prasad,et al. Object Classification based Context Management for Identity Management in Internet of Things , 2013 .
[5] Martin Rudner. Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge , 2013 .