Introduction: Securing the Internet of Things
暂无分享,去创建一个
[1] Peter Booth,et al. The impact of ERP systems on firm and business process performance , 2006, J. Enterp. Inf. Manag..
[2] Yong Chen,et al. A System Framework of Security Management in Enterprise Systems , 2013 .
[3] Jeff K. Stratman,et al. The impact of enterprise systems on corporate performance: A study of ERP, SCM, and CRM system implementations , 2007 .
[4] M. Lim,et al. RFID in the warehouse: A literature analysis (1995–2010) of its applications, benefits, challenges and future trends , 2013 .
[5] Fei Wang,et al. Junction Temperature Measurement of IGBTs Using Short-Circuit Current as a Temperature-Sensitive Electrical Parameter for Converter Prototype Evaluation , 2015, IEEE Transactions on Industrial Electronics.
[6] Meng Wu,et al. Cooperative communications based on trust model for mobile ad hoc networks , 2010, IET Inf. Secur..
[7] Rolf Oppliger. Security and Privacy in an Online World , 2011, Computer.
[8] Senbo Chen,et al. A Trust Evaluation Model for E-Learning Systems , 2014 .
[9] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[10] Christian Floerkemeier,et al. RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.
[11] Rolf H. Weber,et al. Internet of things - Governance quo vadis? , 2013, Comput. Law Secur. Rev..
[12] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .
[13] Andreas Tolk,et al. The RQ-Tech methodology: a new paradigm for conceptualizing strategic enterprise architectures , 2014 .
[14] HyungJun Kim,et al. Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[15] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[16] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[17] Jinho Choi,et al. A general distributed consensus algorithm for wireless sensor networks , 2012, 2012 Wireless Advanced (WiAd).
[18] Li D. Xu. Information architecture for supply chain quality management , 2011 .
[19] Doo Seop Eom,et al. A Robust and Space-Efficient Stack Management Method for Wireless Sensor Network OS with Scarce Hardware Resources , 2012, Int. J. Distributed Sens. Networks.
[20] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[21] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[22] Martin Hepp,et al. Harvesting Wiki Consensus: Using Wikipedia Entries as Vocabulary for Knowledge Management , 2007, IEEE Internet Computing.
[23] D. J. Wu,et al. Investment in Enterprise Resource Planning: Business Impact and Productivity Measures , 2002, J. Manag. Inf. Syst..
[24] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[25] Lionel Touseau,et al. Combining heterogeneous service technologies for building an Internet of Things middleware , 2012, Comput. Commun..
[26] Leilani Battle,et al. Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.
[27] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[28] Bin Wang,et al. An emergency resource allocation model for maritime chemical spill accidents , 2014 .
[29] Steven Furnell. Making security usable: Are things improving? , 2007, Comput. Secur..
[30] Lida Xu,et al. IoT-Based Smart Rehabilitation System , 2014, IEEE Transactions on Industrial Informatics.
[31] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[32] Cong Wang,et al. An Interactive Trust Model for Application Market of the Internet of Things , 2014, IEEE Transactions on Industrial Informatics.
[33] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[34] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..