-
2
-
-
80053168731
-
A study on the 'Internet of things' and its scientific development in China
-
(in Chinese)
-
Y. Z. Yang and J. H. Gao, "A Study on the 'Internet of Things' and Its Scientific Development in China," China Business and Market, pp. 46-49, 2010 (in Chinese).
-
(2010)
China Business and Market
, pp. 46-49
-
-
Yang, Y.Z.1
Gao, J.H.2
-
4
-
-
80053430572
-
Internet of people, things and services - The convergence of security, trust and privacy, information security general science
-
December
-
J. H. P, Eloff, M. M. Eloff, M. T. Dlamini and M. P. Zielinski, "Internet of people, things and services - the convergence of security, trust and privacy, Information security General science," engineering & technology, December, 2009.
-
(2009)
Engineering & Technology
-
-
Eloff, P.J.H.1
Eloff, M.M.2
Dlamini, M.T.3
Zielinski, M.P.4
-
5
-
-
74949143896
-
Internet of things - New security and privacy challenges
-
R. H. Weber, "Internet of Things - New security and privacy challenges," Computer Law & Security Review, vol. 26, pp. 23-30, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, pp. 23-30
-
-
Weber, R.H.1
-
7
-
-
77957599265
-
Proposed security model and threat taxonomy for the internet of things (IoT)
-
S. Babar, P. Mahalle, A. Stango, N. Prasad and R. Prasad, "Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)," Communications in Computer and Information Science, vol.89, pp. 420-429, 2010.
-
(2010)
Communications in Computer and Information Science
, vol.89
, pp. 420-429
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
10
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
IEEE Computer Society
-
Y. Yang, X. Wang, S. Zhu and G. Cao, "Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks," Proc. of 26th IEEE International Symposium on Reliable Distributed Systems, IEEE Computer Society, pp. 219-228, 2007.
-
(2007)
Proc. of 26th IEEE International Symposium on Reliable Distributed Systems
, pp. 219-228
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
11
-
-
78049233831
-
Security characteristic and technology in the internet of things
-
(in Chinese)
-
G. Yang, J. Xu, W. Chen, Z. H. Qi and H. Y. Wang, "Security Characteristic and Technology in the Internet of Things," Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 30, pp. 20-29, 2010(in Chinese).
-
(2010)
Journal of Nanjing University of Posts and Telecommunications (Natural Science)
, vol.30
, pp. 20-29
-
-
Yang, G.1
Xu, J.2
Chen, W.3
Qi, Z.H.4
Wang, H.Y.5
-
12
-
-
80053409890
-
Security model and key technology on internet of things
-
(in Chinese)
-
Y. B. Liu and W. P. Hu, "Security model and key technology on Internet of Things," Digital Communication, pp.28-33, 2010 (in Chinese).
-
(2010)
Digital Communication
, pp. 28-33
-
-
Liu, Y.B.1
Hu, W.P.2
-
13
-
-
24144447453
-
-
Beijing: Publishing House of Electronics Industry (in Chinese)
-
T. Li, Computer immunology, Beijing: Publishing House of Electronics Industry, 2004(in Chinese).
-
(2004)
Computer Immunology
-
-
Li, T.1
-
15
-
-
0037910212
-
Artificial immune system: Principle, models, analysis and perspectives
-
(in Chinese)
-
R. B. Xiao and L. Wang, "Artificial immune system: principle, models, analysis and perspectives," Chinese Journal of Computers, vol. 25, pp. 1281-1293, 2002 (in Chinese).
-
(2002)
Chinese Journal of Computers
, vol.25
, pp. 1281-1293
-
-
Xiao, R.B.1
Wang, L.2
-
16
-
-
3142752196
-
Development and prospect of the artificial I mmune system
-
(in Chinese)
-
L. C. Jiao and H. F. Du, Development and Prospect of the Artificial I mmune System," Acta Electronica Sinica, vol. 31, pp. 1540-1548, 2003 (in Chinese).
-
(2003)
Acta Electronica Sinica
, vol.31
, pp. 1540-1548
-
-
Jiao, L.C.1
Du, H.F.2
-
17
-
-
0029718285
-
An immunological approach to change detection algorithms: Analysis and implications
-
Las Alamitos, CA, USA
-
P. D'haeseleer, S. Forrest and P. Helman, "An immunological approach to change detection algorithms: Analysis and implications," Proc. of IEEE Symposium on Security and Privacy, Las Alamitos, CA, USA, pp. 110-119, 1996.
-
(1996)
Proc. of IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
19
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
DOI 10.1109/TEVC.2002.1011541, PII S1089778X02060666
-
D. Dasgupta, "An immunity-based technique to characterize intrusions in computer networks," IEEE Transactions on Evolutionary Computation, vol. 6, pp. 281-291, 2002. (Pubitemid 34867250)
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
22
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
J. Kim and P. J. Bentley, "Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection," Proc. of the Congress on Evolutionary Computation, pp. 1015-1020, 2002.
-
(2002)
Proc. of the Congress on Evolutionary Computation
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
|