Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling
暂无分享,去创建一个
Vincent Nicomette | Mohamed Kaâniche | Eric Alata | Guillaume Auriol | Jonathan Roux | V. Nicomette | M. Kaâniche | G. Auriol | E. Alata | Jonathan Roux
[1] Xiaochao Dang,et al. An improved indoor localization based on RSSI and feedback correction of anchor node for WSN , 2016, 2016 International Conference on Computer, Information and Telecommunication Systems (CITS).
[2] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[3] Nitesh Dhanjani. Abusing the Internet of Things , 2015 .
[4] Tobias Zillner,et al. ZigBee Exploited The good , the bad and the ugly , 2015 .
[5] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[6] Emanuele Goldoni,et al. Experimental analysis of RSSI-based indoor localization with IEEE 802.15.4 , 2010, 2010 European Wireless Conference (EW).
[7] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[8] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[10] Yunsick Sung. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators , 2016, Entropy.
[11] Ronald S. Ross,et al. Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems [including updates as of 3-21-2018] , 2018 .
[12] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[13] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.