Security and privacy in the internet of things: computational intelligent techniques-based approaches
暂无分享,去创建一个
[1] Fadi Al-Turjman,et al. Confidential smart-sensing framework in the IoT era , 2018, The Journal of Supercomputing.
[2] Cristanel Razafimandimby,et al. A Neural Network and IoT Based Scheme for Performance Assessment in Internet of Robotic Things , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[3] Gualtiero Fantoni,et al. A Blockchain Tokenizer for Industrial IOT trustless applications , 2020, Future Gener. Comput. Syst..
[4] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[5] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[6] M. S. S. Rukmini,et al. IoT in connected vehicles: Challenges and issues — A review , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[7] Li-Chun Wang,et al. Stochastic Blockchain for IoT Data Integrity , 2020, IEEE Transactions on Network Science and Engineering.
[8] Mohammadjavad Abbasi,et al. Bioinspired Evolutionary Algorithm Based for Improving Network Coverage in Wireless Sensor Networks , 2014, TheScientificWorldJournal.
[9] Michael J. Covington,et al. Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[10] Rasit Koker,et al. Green Supplier Selection Using Fuzzy Multiple-Criteria Decision-Making Methods and Artificial Neural Networks , 2020, Comput. Intell. Neurosci..
[11] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[12] Panwit Tuwanut,et al. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends , 2015 .
[13] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[14] Shehzad Khalid,et al. Intelligent Optimization of Wireless Sensor Networks through Bio-Inspired Computing: Survey and Future Directions , 2013, Int. J. Distributed Sens. Networks.
[15] A. Petrillo,et al. Artificial Intelligence and Machine Learning Applications in Smart Production: Progress, Trends and Directions , 2019 .
[16] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[17] Chunpeng Ge,et al. A blockchain based decentralized data security mechanism for the Internet of Things , 2020, J. Parallel Distributed Comput..
[18] Sufian Hameed,et al. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review , 2019, J. Comput. Networks Commun..
[19] Raj Jain,et al. A survey of the research on future internet architectures , 2011, IEEE Communications Magazine.
[20] Petri Ahokangas,et al. Internet-of-things market, value networks, and business models : state of the art report , 2013 .
[21] Sayed Ali Ahmed Elmustafa,et al. Internet of things in Smart Environment: Concept, Applications, Challenges, and Future Directions , 2019 .
[22] Kamal Aldein Mohammed Zeinab,et al. Internet of Things Applications, Challenges and Related Future Technologies , 2017 .
[23] Biplab Sikdar,et al. Low Power Data Integrity in IoT Systems , 2018, IEEE Internet of Things Journal.
[24] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[25] Sufian Hameed,et al. Software Defined Security Service Provisioning Framework for Internet of Things , 2017, ArXiv.
[26] Jiguo Yu,et al. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT , 2020, IEEE Internet of Things Journal.
[27] Konrad S. Wrona,et al. Data-centric security in military applications of commercial IoT technology , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[28] Suellen Teixeira Zavadzki,et al. Computational Intelligence Techniques Used for Stock Market Prediction: A Systematic Review , 2020, IEEE Latin America Transactions.
[29] Sherali Zeadally,et al. Smart healthcare , 2019, PSU Research Review.
[30] Pramod K. Singh,et al. Internet of Things: Applications, security and privacy: A survey , 2020 .
[31] Sunilkumar S. Manvi,et al. Regression based critical information aggregation and dissemination in VANETs: A cognitive agent approach , 2014, Veh. Commun..
[32] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[33] G. M. Siddesh,et al. Bioinspired Techniques for Data Security in IoT , 2020 .
[34] María José del Jesús,et al. Evolutionary Fuzzy Systems for Explainable Artificial Intelligence: Why, When, What for, and Where to? , 2019, IEEE Computational Intelligence Magazine.
[35] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[36] De-Li Yang,et al. A Survey of the Internet of Things , 2010, ICE-B 2010.
[37] Cigdem Sengul,et al. Privacy, consent and authorization in IoT , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).
[38] Yong Xiang,et al. A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT , 2020, IEEE Transactions on Industrial Informatics.
[39] Sriram Sankaran,et al. Lightweight security framework for IoTs using identity based cryptography , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[40] Mohammed W. Baidas,et al. Availability-Reliability-Stability Trade-Offs in Ultra-Reliable Energy-Harvesting Cognitive Radio IoT Networks , 2020, IEEE Access.
[41] Jian Wang,et al. Adoption of Machine Learning in Intelligent Terrain Classification of Hyperspectral Remote Sensing Images , 2020, Comput. Intell. Neurosci..
[42] Mohammad S. Obaidat,et al. ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications , 2019, IET Networks.
[43] Marin Emilov Pamukov,et al. Application of artificial immune systems for the creation of IoT intrusion detection systems , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[44] Öznur Özkasap,et al. DRAW: Data Replication for Enhanced Data Availability in IoT-based Sensor Systems , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[45] Ashish Ghosh,et al. Artificial intelligence in Internet of things , 2018, CAAI Trans. Intell. Technol..
[46] Lei Chen,et al. Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.
[47] Qingqi Pei,et al. Privacy-Preserving Compressive Model for Enhanced Deep-Learning-Based Service Provision System in Edge Computing , 2019, IEEE Access.
[48] Chen Wei,et al. Security Characteristic and Technology in the Internet of Things , 2010 .
[49] Abdul Razaque,et al. Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.
[50] Mohsen Guizani,et al. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.
[51] Sandeep Kumar. CONVERGENCE OF ARTIFICIAL INTELLIGENCE, EMOTIONAL INTELLIGENCE, NEURAL NETWORK AND EVOLUTIONARY COMPUTING , 2012 .
[52] Abdullah Aljumah,et al. Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms , 2019, IEEE Access.
[53] Henrich Christopher Pöhls,et al. JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[54] Janusz Furtak,et al. An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT , 2019, Security and Fault Tolerance in Internet of Things.
[55] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[56] Liu Yang,et al. Research on Security Issues of the Internet of Things , 2013 .
[57] J Slavko Pokorni,et al. Reliability and availability of the Internet of things , 2019, Vojnotehnicki glasnik.
[58] Qi Shi,et al. Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.
[59] Jianfeng Ma,et al. BTNC: A blockchain based trusted network connection protocol in IoT , 2020, J. Parallel Distributed Comput..
[60] M. S. Kakkasageri,et al. Security and Privacy in IoT: A Survey , 2020, Wireless Personal Communications.
[61] Amit P. Sheth,et al. Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.
[62] Victor H. Benitez,et al. Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications , 2019, 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA).
[63] Mainak Chatterjee,et al. Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[64] Constantinos Patsakis,et al. Monkey Says, Monkey Does: Security and Privacy on Voice Assistants , 2017, IEEE Access.
[65] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[66] Jiawei Zhang,et al. Blockchain Based Data Integrity Verification for Large-Scale IoT Data , 2019, IEEE Access.
[67] J. Naren,et al. Field Monitoring and Automation Using IOT in Agriculture Domain , 2016 .
[68] David Hutchison,et al. Survey of Game Theory and Future Trends for Applications in Emerging Wireless Data Communication Networks , 2017, 1704.00323.
[69] Muhammad Waseem,et al. A Review on Internet of Things (IoT) , 2015 .
[70] Qi Luo,et al. Cloud-based lightweight secure RFID mutual authentication protocol in IoT , 2020, Inf. Sci..
[71] Tiago M. Fernández-Caramés,et al. A Review on Internet of Things for Defense and Public Safety , 2016, Sensors.
[72] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[73] Wei Xiang,et al. An IoT-cloud Based Wearable ECG Monitoring System for Smart Healthcare , 2016, Journal of Medical Systems.
[74] Md. Arafatur Rahman,et al. A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks , 2020, Comput. Commun..
[75] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[76] Friedemann Mattern,et al. From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.
[77] Shixing Li,et al. Application Study on Internet of Things in Environment Protection Field , 2011 .
[78] Emil M. Petriu,et al. A Review of Computational Intelligence Techniques in Wireless Sensor and Actuator Networks , 2018, IEEE Communications Surveys & Tutorials.
[79] Juan Manuel Cueva Lovelle,et al. IoFClime: The fuzzy logic and the Internet of Things to control indoor temperature regarding the outdoor ambient conditions , 2017, Future Gener. Comput. Syst..
[80] Xuan Zhu,et al. Computational intelligence techniques and applications , 2014 .
[81] Walid Saad,et al. On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[82] Praveen Gauravaram,et al. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.
[83] Félix Gómez Mármol,et al. A Dynamic Continuous Authentication Framework in IoT-Enabled Environments , 2018, 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
[84] Lina Yao,et al. A unified framework for data integrity protection in people-centric smart cities , 2019, Multimedia Tools and Applications.
[85] AbdelRahman H. Hussein,et al. Internet of Things (IOT): Research Challenges and Future Applications , 2019, International Journal of Advanced Computer Science and Applications.
[86] Ayanthi Saranga Jayawardena,et al. Health Care Workers’ Use Of Electronic Hospital Information System And Their Computer Literacy At The Outpatient Department In District General Hospital Trincomalee In Sri Lanka , 2016 .
[87] Yong Cai,et al. Swarm Intelligence-Based Performance Optimization for Mobile Wireless Sensor Networks: Survey, Challenges, and Future Directions , 2019, IEEE Access.
[88] Marco Stolpe,et al. The Internet of Things: Opportunities and Challenges for Distributed Data Analysis , 2016, SIGKDD Explor..