GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home
暂无分享,去创建一个
Byeong Ho Kang | Ali Raza | Erin Roehrer | Lachlan Hardy | Soonja Yeom | B. Kang | A. Raza | E. Roehrer | Soon-ja Yeom | Lachlan Hardy
[1] Nagaveni B. Biradar,et al. IOTA-Next Generation Block chain , 2018 .
[2] J. Hay. DESIGNING HOMES TO BE THE FIRST LINE OF DEFENSE , 2006 .
[3] Vijay Varadharajan. Internet filtering - Issues and challenges , 2010, IEEE Security & Privacy.
[4] Prabitha Urwyler,et al. Recognition of activities of daily living in healthy subjects using two ad-hoc classifiers , 2015, BioMedical Engineering OnLine.
[5] Zhigang Liu,et al. Vehicle anti-theft tracking system based on Internet of things , 2013, Proceedings of 2013 IEEE International Conference on Vehicular Electronics and Safety.
[6] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[7] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[8] Xiaoli Wang,et al. Mobility tracking using GPS, Wi-Fi and Cell ID , 2012, The International Conference on Information Network 2012.
[9] Albert C. Esterline,et al. Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[10] Josep Domingo-Ferrer,et al. Big Data Privacy: Challenges to Privacy Principles and Models , 2015, Data Science and Engineering.
[11] Lui Sha,et al. Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[12] Dharma P. Agrawal,et al. GPS: Location-Tracking Technology , 2002, Computer.
[13] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[14] Kjartan Ólafsson,et al. Net Children Go Mobile: risks and opportunities , 2014 .
[15] H. Koshima,et al. Personal locator services emerge , 2000 .
[16] Faïez Gargouri,et al. 2012 International Conference on Collaboration Technologies and Systems, CTS 2012, Denver, CO, USA, May 21-25, 2012 , 2012, International Conference on Collaboration Technologies and Systems.
[17] Vijay Sivaraman,et al. Quantifying the reflective DDoS attack capability of household IoT devices , 2017, WISEC.
[18] Euan G. Ritchie,et al. A cost-effective and informative method of GPS tracking wildlife , 2013, Wildlife Research.
[19] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[20] Sneha Kumar Kasera,et al. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks , 2017, WiSec.
[21] P. Starosta,et al. The Structure of Social Trust in Postindustrial Cities of Central and Eastern Europe , 2017, Russian Social Science Review.
[22] Seref Sagiroglu,et al. Big data: A review , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).
[23] Sheng-Cheng Yeh,et al. A study on outdoor positioning technology using GPS and WiFi networks , 2009, 2009 International Conference on Networking, Sensing and Control.
[24] A. Collins,et al. Contemporary Security Studies , 1999 .
[25] N. Noury,et al. Level of activity, night and day alternation, and well being measured in a smart hospital suite , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[26] Mark Ryan,et al. Election Verifiability in Electronic Voting Protocols , 2010, ESORICS.
[27] Feng Zhou,et al. Developing a Trusted System for Tracking Asset on the Move , 2008, 2008 The 9th International Conference for Young Computer Scientists.