-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," Pervasive Computing, IEEE, vol. 7, no. 1, pp. 74-81, 2008.
-
(2008)
Pervasive Computing, IEEE
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
4
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
Second
-
K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," Communications Surveys Tutorials, IEEE, vol. 13, no. 2, pp. 245-257, Second 2011.
-
(2011)
Communications Surveys Tutorials, IEEE
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
5
-
-
84872872368
-
Conditional observe in coap
-
S. Li, J. Hoebeke, and A. Jara, "Conditional observe in coap," Constrained Resources (CoRE) Working Group, Internet Engineering Task Force (IETF), work in progress, draft-li-core-conditional-observe-03, 2012.
-
(2012)
Constrained Resources (CoRE) Working Group, Internet Engineering Task Force (IETF), Work in Progress, draft-li-core-conditional-observe-03
-
-
Li, S.1
Hoebeke, J.2
Jara, A.3
-
6
-
-
84963744744
-
Principled design of the modern web architecture
-
R. T. Fielding and R. N. Taylor, "Principled design of the modern web architecture," ACM Transactions on Internet Technology (TOIT), vol. 2, no. 2, pp. 115-150, 2002.
-
(2002)
ACM Transactions on Internet Technology (TOIT)
, vol.2
, Issue.2
, pp. 115-150
-
-
Fielding, R.T.1
Taylor, R.N.2
-
8
-
-
84901244508
-
Constrained application protocol (coap), draft-ietf-core-coap-13
-
Dec
-
Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained application protocol (coap), draft-ietf-core-coap-13," Orlando: The Internet Engineering Task Force-IETF, Dec, 2012.
-
(2012)
Orlando: The Internet Engineering Task Force-IETF
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Frank, B.4
-
11
-
-
83555176391
-
Security challenges in the ip-based internet of things
-
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, "Security challenges in the ip-based internet of things," Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
16
-
-
3042785862
-
The sybil attack in sensor networks: Analysis &defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis &defenses," in Proceedings of the 3rd international symposium on Information processing in sensor networks. ACM, 2004, pp. 259-268
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. ACM
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
|