Internet of Things: Risk Management
暂无分享,去创建一个
[1] Chunlai Zhou,et al. Research on extracting risk control rules for Internet of Things business , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[2] Meng Xiaofeng,et al. Privacy Preserving Towards Continuous Query in Location-Based Services , 2010 .
[3] Jean-Noel Colin,et al. Adaptive Risk-Aware Access Control Model for Internet of Things , 2017, 2017 International Workshop on Secure Internet of Things (SIoT).
[4] Bogdan Ghilic-Micu,et al. Using Cloud Computing to Address Challenges Raised by the Internet of Things , 2017 .
[5] Stephen D. Wolthusen,et al. Towards Composable Threat Assessment for Medical IoT (MIoT) , 2017, EUSPN/ICTH.
[6] Engin Leloglu. A Review of Security Concerns in Internet of Things , 2017 .
[7] Jinquan Zeng,et al. Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.
[8] Dimitrios Tzovaras,et al. Using Blockchains to Strengthen the Security of Internet of Things , 2018, Euro-CYBERSEC.
[9] Remi Badonnel,et al. Monitoring and Security for the Internet of Things , 2013, AIMS.
[10] Da-Zhi Sun,et al. A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.
[11] Gang Zhao,et al. A novel risk assessment model for privacy security in Internet of Things , 2014, Wuhan University Journal of Natural Sciences.
[12] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[13] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[14] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[15] Berrehili Fatima Zahra,et al. Risk analysis in Internet of Things using EBIOS , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).