-
2
-
-
77953751129
-
-
O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, 2011.
-
(2011)
Internet of Things Strategic Research Roadmap
-
-
Vermesan, O.1
Friess, P.2
Guillemin, P.3
Gusmeroli, S.4
Sundmaeker, H.5
Bassi, A.6
Jubert, I.S.7
Mazura, M.8
Harrison, M.9
Eisenhauer, M.10
Doody, P.11
-
3
-
-
80052854156
-
Securing the internet of things
-
September
-
R. Roman, P. Najera, J. Lopez, Securing the Internet of Things, IEEE Computer, vol. 44, no. 9, pp. 51-58, September 2011.
-
(2011)
IEEE Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
4
-
-
84871767830
-
Towards a theory of trust in net-works of humans and computers
-
Cambridge, UK, March 28-30
-
V. Gligor and J. M. Wing, Towards a Theory of Trust in Net-works of Humans and Computers, 19th International Workshop on Security Protocols, Cambridge, UK, March 28-30, 2011.
-
(2011)
19th International Workshop on Security Protocols
-
-
Gligor, V.1
Wing, J.M.2
-
5
-
-
84871995068
-
A subjective model for trustworthiness evaluation in the social internet of things
-
M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, A Subjective Model for Trustworthiness Evaluation in the Social Internet of Things, 23rd Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2012.
-
(2012)
23rd Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
-
-
Nitti, M.1
Girau, R.2
Atzori, L.3
Iera, A.4
Morabito, G.5
-
9
-
-
13244276903
-
Semantic web technologies to reconcile privacy and context awareness
-
DOI 10.1016/j.websem.2003.07.008, PII S1570826804000022
-
F. Gandon, N. Sadeh, Semantic Web Technologies to Reconcile Privacy and Context Awareness, Web Semantics: Science, Services and Agents on the World Wide Web, vol. 1, no. 3, pp. 241-260, 2004. (Pubitemid 43231669)
-
(2004)
Web Semantics
, vol.1
, Issue.3
, pp. 241-260
-
-
Gandon, F.L.1
Sadeh, N.M.2
-
11
-
-
66649083454
-
Data integrity and intrusion detection in wireless sensor networks
-
R. Acharya, K. Asha, Data integrity and intrusion detection in wireless sensor networks, Proceedings of the IEEE ICON, 2008.
-
(2008)
Proceedings of the IEEE ICON
-
-
Acharya, R.1
Asha, K.2
-
12
-
-
11044225422
-
A Policy-based approach to security for the semantic web
-
L. Kagal, T. Finin, A. Joshi, A Policy-based Approach to Security for the Semantic Web, ISWC, 2003.
-
(2003)
ISWC
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
14
-
-
84883350985
-
A study on immunity of wireless sensor unit in substation, electromagnetic compatibility (EMC EUROPE) 2012
-
17-21 Sept
-
A. Bo, Z. Weidong, C. Xiang, L. Jikun, S. Yingbin, L. Shaoyu, A Study on Immunity of Wireless Sensor Unit in Substation, Electromagnetic Compatibility (EMC EUROPE), 2012 International Symposium on , vol., no., pp.1,5, 17-21 Sept. 2012.
-
(2012)
International Symposium on
, pp. 1-5
-
-
Bo, A.1
Weidong, Z.2
Xiang, C.3
Jikun, L.4
Yingbin, S.5
Shaoyu, L.6
-
15
-
-
84883367187
-
A new conceptual framework for understanding the issues, inviting dialogue and debate, and identifying future research needs
-
L. Kiely, T. Benzel, Systemic Security Management: A new conceptual framework for understanding the issues, inviting dialogue and debate, and identifying future research needs, Institute for Critical Information Infrastructure Protection (ICIIP), 2008.
-
(2008)
Institute for Critical Information Infrastructure Protection (ICIIP)
-
-
Kiely, L.1
Benzel, T.2
Security Management, S.3
-
16
-
-
84883375814
-
A survey on trust management mechanisms for wireless sensor networks & future internet of things
-
H. C. Hsu, K. D. Chang, J. L. Chen, H. C. Chao, A Survey on Trust Management Mechanisms for Wireless Sensor Networks & Future Internet of Things, Journal of Electronic Science and Technology, vol. 9, no. 4, pp. 364-367, 2011.
-
(2011)
Journal of Electronic Science and Technology
, vol.9
, Issue.4
, pp. 364-367
-
-
Hsu, H.C.1
Chang, K.D.2
Chen, J.L.3
Chao, H.C.4
-
17
-
-
85002424663
-
Identity authentication and capability based access control (IACAC) for the internet of things
-
March
-
N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, Identity, Authentication and Capability Based Access Control (IACAC) for the Internet of Things, Journal of Cyber Security and Mobility, Vol. 1, No. 4, p. 309-348, March 2013.
-
(2013)
Journal of Cyber Security and Mobility
, vol.1
, Issue.4
, pp. 309-348
-
-
Mahalle, N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
18
-
-
77956877124
-
The internet of things: A survey
-
May
-
L. Atzori, A. Iera, G. Morabito, The Internet of Things: A survey, Computer Networks, vol. 54, no. 15, pp. 2787-2805, May 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
|