메뉴 건너뛰기




Volumn 7943 LNCS, Issue , 2013, Pages 37-40

Monitoring and security for the Internet of Things

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED SENSORS; EXPOSED TO; INTERNET OF THINGS (IOT); LOW POWER AND LOSSY NETWORK (LLN); MANAGEMENT METHOD; PERVASIVE DEVICES; RESOURCES CONSUMPTION; SECURITY ATTACKS;

EID: 84879644289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38998-6_4     Document Type: Conference Paper
Times cited : (6)

References (10)
  • 5
    • 0038562418 scopus 로고
    • An Introduction to Computer Security
    • NIST
    • NIST: An Introduction to Computer Security: The NIST Handbook (1995)
    • (1995) The NIST Handbook
  • 6
    • 77954885400 scopus 로고    scopus 로고
    • Managing Risks at Runtime in VoIP Networks and Services
    • Stiller, B., De Turck, F. (eds.) AIMS 2010. Springer, Heidelberg
    • Dabbebi, O., Badonnel, R., Festor, O.: Managing Risks at Runtime in VoIP Networks and Services. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 89-92. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6155 , pp. 89-92
    • Dabbebi, O.1    Badonnel, R.2    Festor, O.3
  • 8
    • 35048879636 scopus 로고    scopus 로고
    • RheoStat: Real-Time Risk Management
    • Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
    • Gehani, A., Kedem, G.: RheoStat: Real-Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 296-314. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3224 , pp. 296-314
    • Gehani, A.1    Kedem, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.