메뉴 건너뛰기




Volumn , Issue , 2014, Pages 183-188

A systemic and cognitive approach for IoT security

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL THEORY; ECOSYSTEMS; INTERNET;

EID: 84899512407     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCNC.2014.6785328     Document Type: Conference Paper
Times cited : (57)

References (14)
  • 4
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • DOI: 10.1109/MC.2011.291, September
    • R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things", IEEE Computer, vol. 44, no. 9, pp. 51-58, DOI: 10.1109/MC.2011.291, September 2011.
    • (2011) IEEE Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 7
    • 85002424663 scopus 로고    scopus 로고
    • Identity authentication and capability based access control (IACAC) for the internet of things
    • 309U{double acute}348
    • P. N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, "Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things", Journal of Cyber Security and Mobility, Vol. 1, 309U{double acute}348, 2013.
    • (2013) Journal of Cyber Security and Mobility , vol.1
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 8
    • 80053388902 scopus 로고    scopus 로고
    • Research on immunity-based intrusion detection technology for the internet of things
    • DOI 10.1109/ICNC.2011.6022060
    • C. Liu, J. Yang, Y. Zhang, "Research on Immunity-based Intrusion Detection Technology for the Internet of Things", Seventh International Conference on Natural Computation, DOI 10.1109/ICNC.2011.6022060, 2011.
    • (2011) Seventh International Conference on Natural Computation
    • Liu, C.1    Yang, J.2    Zhang, Y.3
  • 9
    • 66649083454 scopus 로고    scopus 로고
    • Data integrity and intrusion detection in wireless sensor networks
    • R. Acharya, K. Asha, "Data integrity and intrusion detection in wireless sensor networks", Proceedings of the IEEE ICON, 2008.
    • (2008) Proceedings of the IEEE ICON
    • Acharya, R.1    Asha, K.2
  • 10
    • 84863023833 scopus 로고    scopus 로고
    • A survey on security issues of m2m communications in cyber-physical systems
    • DOI: 10.3837/tiis.2012.01.002, January
    • D. Chen and G. Chang, "A Survey on Security Issues of M2M Communications in Cyber-Physical Systems", DOI: 10.3837/tiis.2012.01.002, KSII Transactions on Internet and Information Systems, vol. 6, no. 1, January 2012.
    • (2012) KSII Transactions on Internet and Information Systems , vol.6 , Issue.1
    • Chen, D.1    Chang, G.2
  • 11
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jøsang, R. Ismail, C. Boyd, "A survey of trust and reputation systems for online service provision", Decision Support Systems 43(2), pp. 618U{double acute}644, 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.2
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 12
    • 0141862713 scopus 로고    scopus 로고
    • The meanings of trust
    • Management Information Systems Research Center, University of Minnesota
    • D. McKnight, N. Chervany, "The Meanings of Trust". Technical Report MISRC 96-04, Management Information Systems Research Center, University of Minnesota, 1996
    • (1996) Technical Report MISRC 96-04
    • McKnight, D.1    Chervany, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.