Analysis of the Vulnerability of the IoT by the Scenario
暂无分享,去创建一个
[1] Byung-Chul Kim. A Internet of Things(IoT) based exploration robot design for remote control and monitoring , 2015 .
[2] Se-Jin Kim,et al. Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things , 2016 .
[3] WooSik Bae,et al. Inter-device Mutual authentication and Formal Verification in M2M Environment , 2014 .
[4] Lina P. Kotlyarova,et al. Approach to adaptive control of technological manufacturing processes of IoT metalworking workshop , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).
[5] Haider Abbas,et al. Internet of things (IoT) design considerations for developers and manufacturers , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[6] Keun-Ho Lee,et al. A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing , 2015 .
[7] Salim Hariri,et al. IoT Security Development Framework for building trustworthy Smart car services , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[8] Yoon-Su Jeong,et al. Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment , 2014 .
[9] MyounJae Lee. A Game Design for IoT environment , 2015 .
[10] Han-Jin Cho,et al. A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence , 2017 .
[11] Han-Jin Cho,et al. Smart Fusion Agriculture based on Internet of Thing , 2016 .