National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment
暂无分享,去创建一个
[1] Kwangho Kim. Cyber Security Considerations for Designing IoT-Based Control Systems , 2015, WISA.
[2] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[3] Dongho Won,et al. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.
[4] Namje Park,et al. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.
[5] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[6] Miodrag Potkonjak,et al. Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[7] Eastern District,et al. UNITED STATES DISTRICT COURT , 1999 .
[8] Namje Park. Implementation of terminal middleware platform for mobile RFID computing , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[9] Hyung-Jun Seo,et al. Criteria for Comparing Cyberwarfare Capability , 2011, ICITCS.
[10] Dongho Won,et al. A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems , 2005, ICCSA.
[11] Namje Park,et al. Mobile middleware platform for secure vessel traffic system in IoT service environment , 2016, Secur. Commun. Networks.
[12] Jongin Lim,et al. Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan , 2015, Web Information System and Application Conference.
[13] Ray Bert,et al. Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .
[14] M. Lakomy. Richard A. Clarke, Robert K. Knake: Cyber War The Next Threat to National Security and What to Do About It New York: Ecco, 2010, ss. 290. , 2013 .