-
1
-
-
77956877124
-
The internet of things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey, " Computer Networks, vol. 54, no. 15, Oct. 2010, pp. 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
82155166351
-
SIoT: Giving a social structure to the internet of things
-
Nov
-
L. Atzori, A. Iera, and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things, " IEEE Communication Letters, vol. 15, no. 11, Nov. 2011, pp. 1193-1195.
-
(2011)
IEEE Communication Letters
, vol.15
, Issue.11
, pp. 1193-1195
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
San Francisco, CA, USA, June
-
F. Bao, and I.-R. Chen, "Trust Management for the Internet of Things and Its Application to Service Composition, " in IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services, San Francisco, CA, USA, June 2012.
-
(2012)
IEEE WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services
-
-
Bao, F.1
Chen, I.-R.2
-
4
-
-
80054051095
-
A device-centric approach to a safer internet of things
-
Beijing, China, Sep
-
C. Chen, and S. Helal, "A Device-Centric Approach to a Safer Internet of Things, " in the 2011 International Workshop on Networking and Object Memories for the Internet of Things, Beijing, China, Sep. 2011, pp. 1-6.
-
(2011)
The 2011 International Workshop on Networking and Object Memories for the Internet of Things
, pp. 1-6
-
-
Chen, C.1
Helal, S.2
-
5
-
-
84866346403
-
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
-
Oct
-
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things, " Computer Science and Information Systems, vol. 8, no. 4, Oct. 2011, pp. 1207-1228.
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
6
-
-
81355147383
-
A survey on facilities for experimental internet of things research
-
Nov
-
A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, "A Survey on Facilities for Experimental Internet of Things Research, " IEEE Communications Magazine, vol. 49, no. 11, Nov. 2011, pp. 58-67.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.11
, pp. 58-67
-
-
Gluhak, A.1
Krco, S.2
Nati, M.3
Pfisterer, D.4
Mitton, N.5
Razafindralambo, T.6
-
7
-
-
84862146542
-
A hierarchical intrusion detection system in wireless sensor networks
-
August
-
M. S. Islam, R. H. Khan, and D. M. Bappy, "A Hierarchical Intrusion Detection System in Wireless Sensor Networks, " Computer Science and Network Security, vol. 10, no. 8, August 2010, pp. 21-26.
-
(2010)
Computer Science and Network Security
, vol.10
, Issue.8
, pp. 21-26
-
-
Islam, M.S.1
Khan, R.H.2
Bappy, D.M.3
-
8
-
-
77953319755
-
Routing in socially selfish delay tolerant networks
-
San Diego, CA, March
-
Q. Li, S. Zhu, and G. Cao, "Routing in Socially Selfish Delay Tolerant Networks, " in IEEE Conference on Computer Communications, San Diego, CA, March 2010, pp. 1-9.
-
(2010)
IEEE Conference on Computer Communications
, pp. 1-9
-
-
Li, Q.1
Zhu, S.2
Cao, G.3
-
9
-
-
81355138521
-
Smart community: An internet of things application
-
Nov
-
X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, "Smart Community: An Internet of Things Application, " IEEE Communications Magazine, vol. 49, no. 11, Nov. 2011, pp. 68-75.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.11
, pp. 68-75
-
-
Li, X.1
Lu, R.2
Liang, X.3
Shen, X.4
Chen, J.5
Lin, X.6
-
10
-
-
79960492499
-
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless internet of things
-
July
-
W. Ren, "QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things, " International Journal of Network Management, vol. 21, no. 4, July 2011, pp. 284-299.
-
(2011)
International Journal of Network Management
, vol.21
, Issue.4
, pp. 284-299
-
-
Ren, W.1
-
11
-
-
80052854156
-
Securing the internet of things
-
Sep
-
R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things, " Computer, vol. 44, no. 9, Sep. 2011, pp. 51-58.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
12
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
Montreal, Quebec, Canada, Oct
-
A. d. Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, "Decentralized Intrusion Detection in Wireless Sensor Networks, " in ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, Montreal, Quebec, Canada, Oct. 2005, pp. 16-23.
-
(2005)
ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Silva, A.D.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.6
-
13
-
-
84862276949
-
Wi-Fi enabled sensors for internet of things: A practical approach
-
June
-
S. Tozlu, M. Senel, W. Mao, and A. Keshavarzian, "Wi-Fi Enabled Sensors for Internet of Things: A Practical Approach, " IEEE Communications Magazine, vol. 50, no. 6, June 2012, pp. 134-143.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.6
, pp. 134-143
-
-
Tozlu, S.1
Senel, M.2
Mao, W.3
Keshavarzian, A.4
-
14
-
-
79957583041
-
Multimedia traffic security architecture for the internet of things
-
May-June
-
L. Zhou, and H.-C. Chao, "Multimedia Traffic Security Architecture for the Internet of Things, " IEEE Network, vol. 25, no. 3, May-June 2011, pp. 35-40.
-
(2011)
IEEE Network
, vol.25
, Issue.3
, pp. 35-40
-
-
Zhou, L.1
Chao, H.-C.2
|