Towards a model of privacy and security for smart homes
暂无分享,去创建一个
[1] Per Oscarson,et al. Information Security Fundamentals , 2019, World Conference on Information Security Education.
[2] Roksana Boreli,et al. An experimental study of security and privacy risks with emerging household appliances , 2014, 2014 IEEE Conference on Communications and Network Security.
[3] Andreas Jacobsson,et al. A risk analysis of a smart home automation system , 2016, Future Gener. Comput. Syst..
[4] Tom Kirkham,et al. Risk driven Smart Home resource management using cloud services , 2014, Future Gener. Comput. Syst..
[5] Abdullahi Arabo,et al. Privacy in the Age of Mobility and Smart Devices in Smart Homes , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[6] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[7] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[8] Katina Michael,et al. The Value of Privacy: Safeguarding your information in the age of the Internet of Everything , 2014 .
[9] Stefan Saroiu,et al. Home automation in the wild: challenges and opportunities , 2011, CHI.
[10] Tadayoshi Kohno,et al. Computer security and the modern home , 2013, CACM.
[11] Wolfgang Maass,et al. Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts , 2012, MCIS.
[12] L. Delahoche,et al. The Smart Home Concept : our immediate future , 2006, 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics.
[13] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[14] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[15] Jari Veijalainen,et al. Security and privacy threats in IoT architectures , 2012, BODYNETS.
[16] Karim Djemame,et al. A Risk Assessment Framework and Software Toolkit for Cloud Service Ecosystems , 2011, CLOUD 2011.