Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network
暂无分享,去创建一个
[1] Sanjay Kumar Madria,et al. A Risk Assessment Framework for Wireless Sensor Networks in a Sensor Cloud , 2015, 2015 16th IEEE International Conference on Mobile Data Management.
[2] Asma A. Shaikh. Attacks on cloud computing and its countermeasures , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[3] Al-Sakib Khan Pathan,et al. Wireless Networks and Security, Issues, Challenges and Research Trends , 2013, Wireless Networks and Security.
[4] 샤나즈. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .
[5] Barry Irwin,et al. A privacy and security threat assessment framework for consumer health wearables , 2017, Information Security for South Africa.
[6] Jianhua Li,et al. Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks , 2015, IEEE Sensors Journal.
[7] Farrukh Aslam Khan,et al. A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks , 2014, FNC/MobiSPC.
[8] Naseer Amara,et al. Cloud Computing Security Threats and Attacks with Their Mitigation Techniques , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[9] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[10] Rajani S. Sajjan,et al. Ransomware attacks: Radical menace for cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[11] Kim-Kwang Raymond Choo,et al. Cloud Attack and Risk Assessment Taxonomy , 2015, IEEE Cloud Computing.
[12] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[13] Minho Jo,et al. A survey: energy exhausting attacks in MAC protocols in WBANs , 2015, Telecommun. Syst..
[14] Manisha J. Nene,et al. SEDoS-7: A proactive mitigation approach against EDoS attacks in cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[15] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[16] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[17] Abbas Jamalipour,et al. Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[18] Priyanka Kakria,et al. A Real-Time Health Monitoring System for Remote Cardiac Patients Using Smartphone and Wearable Sensors , 2015, International journal of telemedicine and applications.
[19] Victor C. M. Leung,et al. Trust and Risk Assessment Approach for Access Control in Wireless Sensor Networks , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).
[20] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[21] Azeddine Bilami,et al. Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks , 2018, IEEE Access.