-
1
-
-
33747651434
-
-
(2005, The Internet of Things. Available: http://www.itu.int/osg/spu/ publications/internetofthings/
-
(2005)
The Internet of Things
-
-
-
3
-
-
80955160447
-
That 'internet of things' thing
-
22 July
-
K. Ashton, "That 'Internet of Things' Thing," RFID Journal, 22 July 2009
-
(2009)
RFID Journal
-
-
Ashton, K.1
-
4
-
-
84883730546
-
The internet of things: Between the revolution of the internet and the metamorphosis of objects
-
Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelfflé Vision and Challenges for Realising the Internet of Things
-
G. Santucci, "The internet of things: Between the revolution of the internet and the metamorphosis of objects," Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelfflé Vision and Challenges for Realising the Internet of Things.. Cluster of European Research Projects on the Internet of Things (CERPIoT), 2010
-
(2010)
Cluster of European Research Projects on the Internet of Things (CERPIoT)
-
-
Santucci, G.1
-
8
-
-
75449104170
-
Smart objects as building blocks for the Internet of things
-
G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy, "Smart objects as building blocks for the Internet of things," Internet Computing, IEEE, vol. 14, pp. 44-51, 2010
-
(2010)
Internet Computing, IEEE
, vol.14
, pp. 44-51
-
-
Kortuem, G.1
Kawsar, F.2
Fitton, D.3
Sundramoorthy, V.4
-
11
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, pp. 2787-2805, 2010
-
(2010)
Computer Networks
, vol.54
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
13
-
-
84873341001
-
A review of mobile location privacy in the internet of things
-
Bangkok, Thailand
-
M. Elkhodr, S. Shahrestani, and H. Cheung, "A Review of Mobile Location Privacy in the Internet of Things," in 2012 Tenth International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 2012, pp. 266-272
-
(2012)
2012 Tenth International Conference on ICT and Knowledge Engineering
, pp. 266-272
-
-
Elkhodr, M.1
Shahrestani, S.2
Cheung, H.3
-
14
-
-
84857614011
-
Protocol for mitigating the risk of hijacking social networking sites
-
J. Cashion and M. Bassiouni, "Protocol for mitigating the risk of hijacking social networking sites," in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 324-331
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
, pp. 324-331
-
-
Cashion, J.1
Bassiouni, M.2
-
16
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," Pervasive Computing, IEEE, vol. 2, pp. 46-55, 2003
-
(2003)
Pervasive Computing, IEEE
, vol.2
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
17
-
-
0142156648
-
Inferring high-level behavior from low-level sensors
-
D. Patterson, L. Liao, D. Fox, and H. Kautz, "Inferring high-level behavior from low-level sensors," in UbiComp 2003: Ubiquitous Computing, 2003, pp. 73-89.
-
(2003)
UbiComp: Ubiquitous Computing, 2003
, pp. 73-89
-
-
Patterson, D.1
Liao, L.2
Fox, D.3
Kautz, H.4
|