-
1
-
-
78650942089
-
Vision and challenges for realising the internet of things
-
H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, "Vision and Challenges for Realising the Internet of Things", CERPIoT - Cluster of European Research Projects on the Internet of Things, 2010.
-
(2010)
CERPIoT - Cluster of European Research Projects on the Internet of Things
-
-
Sundmaeker, H.1
Guillemin, P.2
Friess, P.3
Woelfflé, S.4
-
2
-
-
84899558914
-
-
Institute for Critical Information Infrastructure Protection (ICIIP)
-
L. Kiely, T. Benzel, "Systemic Security Management: A new conceptual framework for understanding the issues, inviting dialogue and debate, and identifying future research needs", Institute for Critical Information Infrastructure Protection (ICIIP), 2008.
-
(2008)
Systemic Security Management: A new conceptual framework for understanding the issues, inviting dialogue and debate, and identifying future research needs
-
-
Kiely, L.1
Benzel, T.2
-
3
-
-
84883330172
-
A systemic approach for iot security
-
doi: 10.1109/DCOSS.2013.78IoTIP, Boston, USA, May.
-
A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, A. Bouabdallah, "A Systemic Approach for IoT Security,", 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 351-355, doi: 10.1109/DCOSS.2013.78IoTIP, Boston, USA, May 2013.
-
(2013)
2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
, pp. 351-355
-
-
Riahi, A.1
Challal, Y.2
Natalizio, E.3
Chtourou, Z.4
Bouabdallah, A.5
-
4
-
-
80052854156
-
Securing the internet of things
-
DOI: 10.1109/MC.2011.291, September
-
R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things", IEEE Computer, vol. 44, no. 9, pp. 51-58, DOI: 10.1109/MC.2011.291, September 2011.
-
(2011)
IEEE Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
7
-
-
85002424663
-
Identity authentication and capability based access control (IACAC) for the internet of things
-
309U{double acute}348
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, "Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things", Journal of Cyber Security and Mobility, Vol. 1, 309U{double acute}348, 2013.
-
(2013)
Journal of Cyber Security and Mobility
, vol.1
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
8
-
-
80053388902
-
Research on immunity-based intrusion detection technology for the internet of things
-
DOI 10.1109/ICNC.2011.6022060
-
C. Liu, J. Yang, Y. Zhang, "Research on Immunity-based Intrusion Detection Technology for the Internet of Things", Seventh International Conference on Natural Computation, DOI 10.1109/ICNC.2011.6022060, 2011.
-
(2011)
Seventh International Conference on Natural Computation
-
-
Liu, C.1
Yang, J.2
Zhang, Y.3
-
9
-
-
66649083454
-
Data integrity and intrusion detection in wireless sensor networks
-
R. Acharya, K. Asha, "Data integrity and intrusion detection in wireless sensor networks", Proceedings of the IEEE ICON, 2008.
-
(2008)
Proceedings of the IEEE ICON
-
-
Acharya, R.1
Asha, K.2
-
10
-
-
84863023833
-
A survey on security issues of m2m communications in cyber-physical systems
-
DOI: 10.3837/tiis.2012.01.002, January
-
D. Chen and G. Chang, "A Survey on Security Issues of M2M Communications in Cyber-Physical Systems", DOI: 10.3837/tiis.2012.01.002, KSII Transactions on Internet and Information Systems, vol. 6, no. 1, January 2012.
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.1
-
-
Chen, D.1
Chang, G.2
-
11
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, C. Boyd, "A survey of trust and reputation systems for online service provision", Decision Support Systems 43(2), pp. 618U{double acute}644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
12
-
-
0141862713
-
The meanings of trust
-
Management Information Systems Research Center, University of Minnesota
-
D. McKnight, N. Chervany, "The Meanings of Trust". Technical Report MISRC 96-04, Management Information Systems Research Center, University of Minnesota, 1996
-
(1996)
Technical Report MISRC 96-04
-
-
McKnight, D.1
Chervany, N.2
-
13
-
-
84929046441
-
Trust and punishment
-
Autonomics, Rome, Italy
-
S. Etalle, J.I. den Hartog, and S. Marsh, "Trust and Punishment", Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy, 2007.
-
(2007)
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems
-
-
Etalle, S.1
Den Hartog, J.I.2
Marsh, S.3
|