메뉴 건너뛰기




Volumn , Issue , 2013, Pages 771-775

A novel approach to IoT security based on immunology

Author keywords

Detection; Detector; Immunology; IoT Security; Security Defense

Indexed keywords

BIOLOGICAL IMMUNE SYSTEM; DISPERSITY; INTERNET OF THING (IOT); IOT SECURITY; SECURITY DEFENSE; SECURITY PROBLEMS; SECURITY SITUATION; TRADITIONAL COMPUTERS;

EID: 84900620312     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2013.168     Document Type: Conference Paper
Times cited : (40)

References (25)
  • 1
    • 84900662113 scopus 로고    scopus 로고
    • International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU, 2005
    • International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU, 2005.
  • 3
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • A. Luigi, I. Antonio, M. Giacomo. The Internet of Things: A survey. Computer Networks, 2010, 54(15): 2787-2805.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Luigi, A.1    Antonio, I.2    Giacomo, M.3
  • 6
    • 84900662711 scopus 로고    scopus 로고
    • IDC. http://www.idc.com.cn/about/press.jsp?id=NTY5. 2011.
    • (2011)
  • 8
    • 0037910212 scopus 로고    scopus 로고
    • Artificial immune system: Principle, models, analysis and perspectives
    • R. B. Xiao and L. Wang. Artificial immune system: principle, models, analysis and perspectives. Chinese Journal of Computers, 2002, 25: 1281-1293.
    • (2002) Chinese Journal of Computers , vol.25 , pp. 1281-1293
    • Xiao, R.B.1    Wang, L.2
  • 9
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S. A. Hofmeyr, S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473.
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.A.1    Forrest, S.2
  • 10
    • 24144447453 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry
    • T. Li. Computer immunology, Beijing: Publishing House of Electronics Industry, 2004.
    • (2004) Computer Immunology
    • Li, T.1
  • 11
    • 84900618948 scopus 로고    scopus 로고
    • http://www.artificial-immune-systems.org/icaris.shtml.
  • 13
    • 0036613003 scopus 로고    scopus 로고
    • An artificial immune system architecture for computer security applications
    • P. K. Harmer, P. D. Williams, et al. An artificial immune system architecture for computer security applications. IEEE Transaction on Evolutionary Computation, 2002, 6(3): 252-280.
    • (2002) IEEE Transaction on Evolutionary Computation , vol.6 , Issue.3 , pp. 252-280
    • Harmer, P.K.1    Williams, P.D.2
  • 16
    • 84901408225 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
    • J. Kim, P. J. Bentley. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. Proc. of the Congress on Evolutionary Computation, 2002, pp. 1015-1020.
    • (2002) Proc. of the Congress on Evolutionary Computation , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2
  • 21
    • 33744964854 scopus 로고    scopus 로고
    • Design and analysis of cryptographic protocols for rfid
    • Y. B. Zhou, D. G. Feng. Design and Analysis of Cryptographic Protocols for RFID. Chinese Journal of Computers, 2006, 29 (4): 581589.
    • (2006) Chinese Journal of Computers , vol.29 , Issue.4 , pp. 581589
    • Zhou, Y.B.1    Feng, D.G.2
  • 24
    • 80052689804 scopus 로고    scopus 로고
    • A security transmission model for internet of things
    • Z. Q. Wu, Y. W. Zhou, J. F. Ma. A Security Transmission Model for Internet of Things. Chinese Journal of Computers, 2011, 34(8): 13511364.
    • (2011) Chinese Journal of Computers , vol.34 , Issue.8 , pp. 13511364
    • Wu, Z.Q.1    Zhou, Y.W.2    Ma, J.F.3
  • 25
    • 84900648805 scopus 로고    scopus 로고
    • Chengdu: University of Electronic Science and Technology Press
    • C. Y. Zhang. Architecture of Network Security. Chengdu: University of Electronic Science and Technology Press, 2006.
    • (2006) Architecture of Network Security
    • Zhang, C.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.