-
1
-
-
84900662113
-
-
International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU, 2005
-
International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things, Geneva: ITU, 2005.
-
-
-
-
3
-
-
77956877124
-
The internet of things: A survey
-
A. Luigi, I. Antonio, M. Giacomo. The Internet of Things: A survey. Computer Networks, 2010, 54(15): 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Luigi, A.1
Antonio, I.2
Giacomo, M.3
-
5
-
-
74949103943
-
Study on the architecture and associated technologies for internet of things
-
S. B. Shen, Q. L. Fan, P. Zong, Q. Y. Mao and W. Huang. Study on the Architecture and Associated Technologies for Internet of Things. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2009, 29(6): 1-11.
-
(2009)
Journal of Nanjing University of Posts and Telecommunications (Natural Science)
, vol.29
, Issue.6
, pp. 1-11
-
-
Shen, S.B.1
Fan, Q.L.2
Zong, P.3
Mao, Q.Y.4
Huang, W.5
-
6
-
-
84900662711
-
-
IDC. http://www.idc.com.cn/about/press.jsp?id=NTY5. 2011.
-
(2011)
-
-
-
8
-
-
0037910212
-
Artificial immune system: Principle, models, analysis and perspectives
-
R. B. Xiao and L. Wang. Artificial immune system: principle, models, analysis and perspectives. Chinese Journal of Computers, 2002, 25: 1281-1293.
-
(2002)
Chinese Journal of Computers
, vol.25
, pp. 1281-1293
-
-
Xiao, R.B.1
Wang, L.2
-
9
-
-
0034546374
-
Architecture for an artificial immune system
-
S. A. Hofmeyr, S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
10
-
-
24144447453
-
-
Beijing: Publishing House of Electronics Industry
-
T. Li. Computer immunology, Beijing: Publishing House of Electronics Industry, 2004.
-
(2004)
Computer Immunology
-
-
Li, T.1
-
11
-
-
84900618948
-
-
http://www.artificial-immune-systems.org/icaris.shtml.
-
-
-
-
13
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
P. K. Harmer, P. D. Williams, et al. An artificial immune system architecture for computer security applications. IEEE Transaction on Evolutionary Computation, 2002, 6(3): 252-280.
-
(2002)
IEEE Transaction on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
-
16
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
J. Kim, P. J. Bentley. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. Proc. of the Congress on Evolutionary Computation, 2002, pp. 1015-1020.
-
(2002)
Proc. of the Congress on Evolutionary Computation
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
18
-
-
70350755889
-
Internet of things and privacy preserving technologies
-
Aalborg, Denmark, May
-
V. Oleshchuk. Internet of things and privacy preserving technologies. Proc. of 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace &Electronic Systems Technology(Wireless VITAE), Aalborg, Denmark, May, 2009, pp. 336-340.
-
(2009)
Proc. of 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace &Electronic Systems Technology(Wireless VITAE
, pp. 336-340
-
-
Oleshchuk, V.1
-
21
-
-
33744964854
-
Design and analysis of cryptographic protocols for rfid
-
Y. B. Zhou, D. G. Feng. Design and Analysis of Cryptographic Protocols for RFID. Chinese Journal of Computers, 2006, 29 (4): 581589.
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.4
, pp. 581589
-
-
Zhou, Y.B.1
Feng, D.G.2
-
23
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Y. Yang, X. Wang, S. Zhu, G. Cao. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. Proc. of 26th IEEE International Symposium on Reliable Distributed Systems, IEEE Computer Society, 2007, pp. 219-228.
-
(2007)
Proc. of 26th IEEE International Symposium on Reliable Distributed Systems, IEEE Computer Society
, pp. 219-228
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
24
-
-
80052689804
-
A security transmission model for internet of things
-
Z. Q. Wu, Y. W. Zhou, J. F. Ma. A Security Transmission Model for Internet of Things. Chinese Journal of Computers, 2011, 34(8): 13511364.
-
(2011)
Chinese Journal of Computers
, vol.34
, Issue.8
, pp. 13511364
-
-
Wu, Z.Q.1
Zhou, Y.W.2
Ma, J.F.3
-
25
-
-
84900648805
-
-
Chengdu: University of Electronic Science and Technology Press
-
C. Y. Zhang. Architecture of Network Security. Chengdu: University of Electronic Science and Technology Press, 2006.
-
(2006)
Architecture of Network Security
-
-
Zhang, C.Y.1
|