-
1
-
-
84907206990
-
The internet of things - How the next evolution of the internet is changing everything
-
white paper, Apr.
-
D. Evans, "The Internet of Things - How the next evolution of the internet is changing everything," white paper, Cisco IBSG, Apr. 2011.
-
(2011)
Cisco IBSG
-
-
Evans, D.1
-
2
-
-
84907217070
-
Internet of things (IoT) - Enabling technologies, applications and open issues
-
IGI Global Press, 3rd ed
-
T. Kaukalias and P. Chatzimisios, "Internet of Things (IoT) - enabling technologies, applications and open issues," in Encyclopedia of Information Science and Technology, IGI Global Press, 3rd ed., 2014.
-
(2014)
Encyclopedia of Information Science and Technology
-
-
Kaukalias, T.1
Chatzimisios, P.2
-
3
-
-
84907217069
-
Russia: Hidden chips 'launch spam attacks from irons'
-
(Oct.). [Online]
-
(2013, Oct.). "Russia: Hidden chips 'launch spam attacks from irons'." BBC News. [Online] Available: http://www.bbc.com/news/blogsnews-from-elsewhere-24707337
-
(2013)
BBC News
-
-
-
4
-
-
84907217068
-
Fridge sends spam emails as attack hits smart gadgets
-
(Jan.). [Online]
-
(2014, Jan.). "Fridge sends spam emails as attack hits smart gadgets." BBC News. [Online] Available: http://www.bbc.com/news/technology-25780908
-
(2014)
BBC News
-
-
-
5
-
-
84904389907
-
Threat implications of the Internet of Things
-
June
-
M. Covington and R. Carskadden, "Threat implications of the Internet of Things," in Proc. CyCon, June 2013, pp. 1-12.
-
(2013)
Proc. CyCon
, pp. 1-12
-
-
Covington, M.1
Carskadden, R.2
-
6
-
-
84891714668
-
Denial-of-service detection in 6LoWPAN based Internet of Things
-
Oct.
-
P. Kasinathan et al., "Denial-of-service detection in 6LoWPAN based Internet of Things," in Proc. IEEE WiMob, Oct. 2013, pp. 600-607.
-
(2013)
Proc. IEEE WiMob
, pp. 600-607
-
-
Kasinathan, P.1
-
7
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the Internet of Things
-
L. Fagen and X. Pan, "Practical secure communication for integrating wireless sensor networks into the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3684, 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3677-3684
-
-
Fagen, L.1
Pan, X.2
-
8
-
-
84893439288
-
Smart grid wireless network security requirements analysis
-
Aug.
-
K. A. Ahmed, Z. Aung, and D. Svetinovic, "Smart grid wireless network security requirements analysis," in Proc. IEEE GreenCom, Aug. 2013, pp. 871-878.
-
(2013)
Proc. IEEE GreenCom
, pp. 871-878
-
-
Ahmed, K.A.1
Aung, Z.2
Svetinovic, D.3
-
9
-
-
84899910987
-
DoS attack detection in Internet-connected vehicles
-
Dec.
-
J. Soryal and T. Saadawi, "DoS attack detection in Internet-connected vehicles," in Proc. ICCVE, Dec. 2013, pp. 7-13.
-
(2013)
Proc. ICCVE
, pp. 7-13
-
-
Soryal, J.1
Saadawi, T.2
-
10
-
-
84907206989
-
Measuring the Internet's threat level: A global-local approach
-
June
-
S. Kollias et al., "Measuring the Internet's threat level: A global-local approach," in Proc. IEEE PEDIWESA, June 2014.
-
(2014)
Proc. IEEE PEDIWESA
-
-
Kollias, S.1
-
11
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Oct.
-
C. C. Zou et al., "Monitoring and early warning for internet worms," in Proc. ACM CSS, Oct. 2003, pp. 190-199.
-
(2003)
Proc. ACM CSS
, pp. 190-199
-
-
Zou, C.C.1
-
12
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System)- motivation, architecture, and an early prototype
-
S. R. Snapp et al., "DIDS (Distributed Intrusion Detection System)- motivation, architecture, and an early prototype," in Proc. National Comput. Security Conf., 1991, pp. 167-176.
-
(1991)
Proc. National Comput. Security Conf.
, pp. 167-176
-
-
Snapp, S.R.1
-
14
-
-
1642434224
-
Using sensor networks and data fusion for early detection of active worms
-
23 Sept.
-
V. H. Berk, R. S. Gray, and G. Bakos, "Using sensor networks and data fusion for early detection of active worms," in Proc. Airo Sense, 23 Sept. 2003, pp. 92-104.
-
(2003)
Proc. Airo Sense
, pp. 92-104
-
-
Berk, V.H.1
Gray, R.S.2
Bakos, G.3
-
15
-
-
2342522755
-
Security applications of peer-to-peer networks
-
V. Vlachos, S. Androutsellis-Theotokis, and D. Spinellis, "Security applications of peer-to-peer networks," Comput. Netw., vol. 45, no. 2, pp. 195-205, 2004.
-
(2004)
Comput. Netw.
, vol.45
, Issue.2
, pp. 195-205
-
-
Vlachos, V.1
Androutsellis-Theotokis, S.2
Spinellis, D.3
-
16
-
-
34547936756
-
A PROactive malware identification system based on the computer hygiene principles
-
V. Vlachos and D. Spinellis, "A PROactive malware identification system based on the computer hygiene principles," Inform. Management Comput. Security, vol. 15, no. 4, pp. 295-312, 2007.
-
(2007)
Inform. Management Comput. Security
, vol.15
, Issue.4
, pp. 295-312
-
-
Vlachos, V.1
Spinellis, D.2
-
18
-
-
84907217067
-
-
[Online]
-
"Cisco IronPort reputation filters." [Online]. Available: http://www.cisco.com/c/dam/en/us/products/collateral/security/email-security-appliance/ironport-reputation-filters.pdf
-
Cisco IronPort Reputation Filters
-
-
-
19
-
-
84907213102
-
-
[Online]
-
"Dshield." [Online]. Available: http://www.dshield.org/
-
Dshield
-
-
-
20
-
-
84872583362
-
Visual analytics for BGP monitoring and prefix hijacking identification
-
E. Biersack et al., "Visual analytics for BGP monitoring and prefix hijacking identification," IEEE Network, vol. 26, no. 6, pp. 33-39, 2012.
-
(2012)
IEEE Network
, vol.26
, Issue.6
, pp. 33-39
-
-
Biersack, E.1
-
21
-
-
78649239474
-
Spam cloud: A map reduce based antispam architecture
-
Aug.
-
G. Caruana, M. Li, and H. Qi, "Spam Cloud: A Map Reduce based antispam architecture," in Proc. FSKD, vol. 6, Aug. 2010, pp. 3003-3006.
-
(2010)
Proc. FSKD
, vol.6
, pp. 3003-3006
-
-
Caruana, G.1
Li, M.2
Qi, H.3
-
22
-
-
79958726067
-
HARMUR: Storing and analyzing historic data on malicious domains
-
Apr.
-
C. Leita and M. Cova, "HARMUR: Storing and analyzing historic data on malicious domains," in Proc. Euro Sys BADGERS, Apr. 2011, pp. 44-51.
-
(2011)
Proc. Euro Sys BADGERS
, pp. 44-51
-
-
Leita, C.1
Cova, M.2
-
23
-
-
51549108952
-
SGNET: A worldwide deployable framework to support the analysis of malware threat models
-
May
-
C. Leita and M. Dacier, "SGNET: A worldwide deployable framework to support the analysis of malware threat models," in Proc. EDCC, May 2008, pp. 99-109.
-
(2008)
Proc. EDCC
, pp. 99-109
-
-
Leita, C.1
Dacier, M.2
-
24
-
-
84877647628
-
Performance evaluation of security routing strategies to avoid DoS attacks in WSN
-
Dec.
-
L. Mokdad and J. Ben-Othman, "Performance evaluation of security routing strategies to avoid DoS attacks in WSN," in Proc. IEEE GLOBECOM, Dec. 2012, pp. 2859-2863.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 2859-2863
-
-
Mokdad, L.1
Ben-Othman, J.2
-
25
-
-
84875228943
-
IBC-HWMP: A novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s
-
J. Ben-Othman and Y. I. Saavedra Benitez, "IBC-HWMP: A novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s," Concurrency Comput.: Practice Experience, vol. 25, no. 5, pp. 686-700, 2013.
-
(2013)
Concurrency Comput.: Practice Experience
, vol.25
, Issue.5
, pp. 686-700
-
-
Ben-Othman, J.1
Saavedra Benitez, Y.I.2
-
26
-
-
84875656880
-
Performance comparison between IBE-HWMP and ECDSA-HWMP
-
Y. I. Saavedra Benitez, J. Ben-Othman, and J.-P. Claudé, "Performance comparison between IBE-HWMP and ECDSA-HWMP," Security Commun. Netw., vol. 6, no. 4, pp. 437-449, 2013.
-
(2013)
Security Commun. Netw.
, vol.6
, Issue.4
, pp. 437-449
-
-
Saavedra Benitez, Y.I.1
Ben-Othman, J.2
Claudé, J.-P.3
-
28
-
-
34547927497
-
PROMISing steps towards computer hygiene
-
July
-
V. Vlachos, A. Raptis, and D. Spinellis, "PROMISing steps towards computer hygiene," in Proc. INC, July 2006, pp. 229-236.
-
(2006)
Proc. INC
, pp. 229-236
-
-
Vlachos, V.1
Raptis, A.2
Spinellis, D.3
-
29
-
-
83355172245
-
A lightweight SOAP over CoAP transport binding for resource constraint networks
-
G. Moritz, F. Golatowski, and D. Timmermann, "A lightweight SOAP over CoAP transport binding for resource constraint networks," in Proc. MASS, 2011, pp. 861-866.
-
(2011)
Proc. MASS
, pp. 861-866
-
-
Moritz, G.1
Golatowski, F.2
Timmermann, D.3
|