IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars
暂无分享,去创建一个
Masood Ur Rehman | Naeem Ramzan | Muhammad Ali Imran | Tahera Kalsoom | Ghazanfar Ali Safdar | Marcia Gibson | Hasna Uddin | M. Imran | M. Rehman | G. A. Safdar | T. Kalsoom | N. Ramzan | Marcia Gibson | Hasna Uddin
[1] Maurizio Morisio,et al. Connected Car , 2016, ACM Comput. Surv..
[2] M. Hemanth Kumar,et al. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks , 2019 .
[3] Sheetal Koul,et al. Smart Traffic Management System , 2013 .
[4] Dhananjay Singh,et al. Internet of vehicles for smart and safe driving , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[5] Tai-Hoon Kim,et al. Smart City and IoT , 2017, Future Gener. Comput. Syst..
[6] Vasudeva Pai,et al. Survey on IoT Security Issues and Security Protocols , 2018 .
[7] Mayank Panchal,et al. A Review : Internet of Things ( IoT ) Based Smart Home Automation , 2017 .
[8] Mansoor Ahmed,et al. Smart Cities: A Survey on Security Concerns , 2016 .
[9] Joseph Wei,et al. How Wearables Intersect with the Cloud and the Internet of Things : Considerations for the developers of wearables. , 2014, IEEE Consumer Electronics Magazine.
[10] D. Kishore,et al. IOT based Smart Home Security System with Alert and Door Access Control using Smart Phone , 2016 .
[11] Jafar Saniie,et al. Home Automation Device Protocol (HADP): A Protocol Standard for Unified Device Interactions , 2015, IOT 2015.
[12] Isam Shahrour,et al. Introducing Smart Cities: A Transdisciplinary Journal on the Science and Technology of Smart Cities , 2018 .
[13] Bruce Schneier,et al. IoT Security: What's Plan B? , 2017, IEEE Secur. Priv..
[14] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[15] Belal Amro,et al. Phishing Techniques in Mobile Devices , 2018, ArXiv.
[16] Medhat H A Awadalla. Design of a smart traffic information system , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
[17] Richard Chow,et al. The Last Mile for IoT Privacy , 2017, IEEE Security & Privacy.