Emerging Trends in Smart Home Security, Privacy, and Digital Forensics
暂无分享,去创建一个
[1] Jill Slay,et al. Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[2] Robert Hegarty,et al. Digital Evidence Challenges in the Internet of Things , 2014, INC.
[3] Iain Sutherland,et al. Forensic analysis of smart TV: A current issue and call to arms , 2014, Digit. Investig..
[4] Steffen Wendzel,et al. Envisioning Smart Building Botnets , 2014, Sicherheit.
[5] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[6] Tobias Zillner,et al. ZigBee Exploited The good , the bad and the ugly , 2015 .
[7] Srinivas Bangalore,et al. Personalized speech recognition for Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[8] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[9] Adam Wynne,et al. Enforcing fine-grained security and privacy policies in an ecosystem within an ecosystem , 2015, MobileDeLi.
[10] Alan T. Sherman,et al. UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .
[11] Tim Storer,et al. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.
[12] Steven I. Friedland,et al. I Spy: The New Self-Cybersurveillance , 2015 .
[13] Marie-Helen Maras,et al. Internet of Things: security and privacy implications , 2015 .
[14] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[15] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[16] Charlie Wilson,et al. Smart homes and their users: a systematic analysis and key challenges , 2014, Personal and Ubiquitous Computing.
[17] Paul Sant,et al. The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[18] James Newsome,et al. Challenges in Access Right Assignment for Secure Home Networks , 2010, HotSec.
[19] Scott R. Peppet. Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .
[20] Bin Ma,et al. Joint Application of Speech and Speaker Recognition for Automation and Security in Smart Home , 2011, INTERSPEECH.