-
3
-
-
84904428973
-
End-user interfaces for energy-efficient semantically enabled smart homes
-
Springer-Business Mediea Dordrecht
-
A. Fensel, V. Kumar, and S.D.K. Tomic End-user interfaces for energy-efficient semantically enabled smart homes Energy Efficiency 2014 Springer-Business Mediea Dordrecht
-
(2014)
Energy Efficiency
-
-
Fensel, A.1
Kumar, V.2
Tomic, S.D.K.3
-
6
-
-
84872036052
-
Computer security and the modern home
-
T. Denning, T. Kohno, and H.M. Levy Computer security and the modern home Commun. ACM 56 1 2013 94 103
-
(2013)
Commun. ACM
, vol.56
, Issue.1
, pp. 94-103
-
-
Denning, T.1
Kohno, T.2
Levy, H.M.3
-
7
-
-
79958167916
-
Home automation in the wild: Challenges and opportunities
-
A.J. Bernheim Brush, B. Lee, R. Mahajan, S. Agarwal, S. Saroiu, C. Dixon, Home automation in the wild: Challenges and opportunities, in: Proc. of the ACM Conference on Human Factors in Computing Systems, 2011.
-
(2011)
Proc. of the ACM Conference on Human Factors in Computing Systems
-
-
Bernheim Brush, A.J.1
Lee, B.2
Mahajan, R.3
Agarwal, S.4
Saroiu, S.5
Dixon, C.6
-
8
-
-
84868134047
-
Critical privacy factors of Internet of things services: An empirical investigation with domain experts
-
Lecture Notes in Business Information Processing Springer Dordrecht
-
T. Kowatsch, and W. Maass Critical privacy factors of Internet of things services: An empirical investigation with domain experts Knowledge and Technologies in Innovative Information Systems Lecture Notes in Business Information Processing vol. 129 2012 Springer Dordrecht 200 211
-
(2012)
Knowledge and Technologies in Innovative Information Systems
, vol.129
, pp. 200-211
-
-
Kowatsch, T.1
Maass, W.2
-
10
-
-
79953100622
-
Accountability in the Internet of things
-
R. Weber Accountability in the Internet of things Comput. Law Secur. Rev. 27 2011 133 138
-
(2011)
Comput. Law Secur. Rev.
, vol.27
, pp. 133-138
-
-
Weber, R.1
-
12
-
-
0026970695
-
Non-intrusive appliance load monitoring
-
G.W. Hart Non-intrusive appliance load monitoring Proc. IEEE 80 12 1992 1870 1891
-
(1992)
Proc. IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart, G.W.1
-
13
-
-
84861633212
-
Leveraging smart meter data to recognize home appliances
-
M. Weiss, A. Helfenstein, F. Mattern, T. Staake, Leveraging smart meter data to recognize home appliances, in: Proc. of the 10th IEEE Conf. on Pervasive Computing and Communication, 2012.
-
(2012)
Proc. of the 10th IEEE Conf. on Pervasive Computing and Communication
-
-
Weiss, M.1
Helfenstein, A.2
Mattern, F.3
Staake, T.4
-
14
-
-
80052854156
-
Securing the Internet of things
-
R. Roman, P. Najera, and J. Lopez Securing the Internet of things IEEE Comput. 44 9 2011 51 58
-
(2011)
IEEE Comput.
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
15
-
-
84874435598
-
A risk assessment framework and software toolkit for cloud service ecosystems
-
K. Djemme, D.J. Armstrong, M. Krian, M. Jiang, A risk assessment framework and software toolkit for cloud service ecosystems, in: Proc. of the 2nd Int. Conf. on Cloud Computing, GRIDs, and Visualization, 2011.
-
(2011)
Proc. of the 2nd Int. Conf. on Cloud Computing, GRIDs, and Visualization
-
-
Djemme, K.1
Armstrong, D.J.2
Krian, M.3
Jiang, M.4
-
17
-
-
79960904737
-
Proposed embedded security framework for Internet of things (IoT)
-
S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for Internet of things (IoT), in: Int. Conf. on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, 2011.
-
(2011)
Int. Conf. on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology
-
-
Babar, S.1
Stango, A.2
Prasad, N.3
Sen, J.4
Prasad, R.5
-
18
-
-
84876156481
-
Cyberentity security in the Internet of things
-
H. Ning, H. Liu, and L.T. Yang Cyberentity security in the Internet of things IEEE Comput. 46 4 2013 46 53
-
(2013)
IEEE Comput.
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
20
-
-
84873956064
-
The Internet of things
-
R. van Kranenburg, E. Anzelmo, A. Bassi, D. Caprio, S. Dodson, M. Ratto, The Internet of things, in: Proc. of the First Berlin Symposium on Internet and Society, 2011.
-
(2011)
Proc. of the First Berlin Symposium on Internet and Society
-
-
Van Kranenburg, R.1
Anzelmo, E.2
Bassi, A.3
Caprio, D.4
Dodson, S.5
Ratto, M.6
-
21
-
-
84921461758
-
Securing smart home: Technologies, security challenges, and security requirements
-
C. Lee, L. Zappaterra, K. Choi, H.-A. Choi, Securing smart home: Technologies, security challenges, and security requirements, in: Proc. of the IEEE Conf. on Communications and Network Security, 2014.
-
(2014)
Proc. of the IEEE Conf. on Communications and Network Security
-
-
Lee, C.1
Zappaterra, L.2
Choi, K.3
Choi, H.-A.4
-
22
-
-
79958046958
-
Home automation and security for mobile devices
-
S.R. Das, S. Chita, N. Peterson, B.A. Shirazi, M. Bhadkamkar, Home automation and security for mobile devices, in: Int. IEEE Conf. on Pervasive Communities and Service Clouds, 2011.
-
(2011)
Int. IEEE Conf. on Pervasive Communities and Service Clouds
-
-
Das, S.R.1
Chita, S.2
Peterson, N.3
Shirazi, B.A.4
Bhadkamkar, M.5
-
23
-
-
84921536300
-
An experimental study of security and privacy risks with emerging household appliances
-
S. Notra, M. Siddiqi, H.H. Gharakheili, V. Sivaraman, R. Boreli, An experimental study of security and privacy risks with emerging household appliances, in: Proc. of Int. Workshop on Security and Privacy in Machine-to-Machine Communications, 2014.
-
(2014)
Proc. of Int. Workshop on Security and Privacy in Machine-to-Machine Communications
-
-
Notra, S.1
Siddiqi, M.2
Gharakheili, H.H.3
Sivaraman, V.4
Boreli, R.5
-
27
-
-
84964856143
-
Threat landscape and good practice guide for smart home and converged media
-
D. Barnards-Wills, L. Marinos, S. Portesi, Threat landscape and good practice guide for smart home and converged media, European Union Agency for Network and Information Security, ENISA, 2014.
-
(2014)
European Union Agency for Network and Information Security, ENISA
-
-
Barnards-Wills, D.1
Marinos, L.2
Portesi, S.3
-
30
-
-
84879864430
-
Characterising software platforms from an architectural perspective
-
Lecture Notes in Computer Science Springer Berlin
-
U. Eklund, C.M. Olsson, and M. Ljungblad Characterising software platforms from an architectural perspective Software Architecture Lecture Notes in Computer Science vol. 7957 2013 Springer Berlin 344 347
-
(2013)
Software Architecture
, vol.7957
, pp. 344-347
-
-
Eklund, U.1
Olsson, C.M.2
Ljungblad, M.3
-
31
-
-
78149253241
-
Design and implementation of smart home energy management systems based on ZigBee
-
D.M. Han, and J.H. Lim Design and implementation of smart home energy management systems based on ZigBee IEEE Trans. Consum. Electron. 56 3 2010 1417 1425
-
(2010)
IEEE Trans. Consum. Electron.
, vol.56
, Issue.3
, pp. 1417-1425
-
-
Han, D.M.1
Lim, J.H.2
-
33
-
-
34047126869
-
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
-
P. Baronti, P. Pillai, S. Chessa, A. Gotta, and Y.F. Hu Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards Comput. Commun. 30 7 2007
-
(2007)
Comput. Commun.
, vol.30
, Issue.7
-
-
Baronti, P.1
Pillai, P.2
Chessa, S.3
Gotta, A.4
Hu, Y.F.5
-
34
-
-
84861884881
-
A survey of communications and networking technologies for energy management in buildings and home automation
-
A. Kailas, V. Cecchi, and A. Mukherjee A survey of communications and networking technologies for energy management in buildings and home automation J. Comput. Netw. Commun. 2012 2012
-
(2012)
J. Comput. Netw. Commun.
, vol.2012
-
-
Kailas, A.1
Cecchi, V.2
Mukherjee, A.3
-
36
-
-
0004084588
-
-
Routledge Oxford
-
J. Adams Risk 2000 Routledge Oxford
-
(2000)
Risk
-
-
Adams, J.1
-
37
-
-
67249147788
-
Security aspects on inter-organizational cooperation using wrapper agents
-
Lecture Notes in Business Information Processing Springer Berlin
-
B. Carlsson, P. Davidsson, A. Jacobsson, S.J. Johansson, and J.A. Persson Security aspects on inter-organizational cooperation using wrapper agents Agent-Based Technologies and Applications for Enterprise Interoperability Lecture Notes in Business Information Processing vol. 25 2009 Springer Berlin 220 233
-
(2009)
Agent-Based Technologies and Applications for Enterprise Interoperability
, vol.25
, pp. 220-233
-
-
Carlsson, B.1
Davidsson, P.2
Jacobsson, A.3
Johansson, S.J.4
Persson, J.A.5
-
38
-
-
17844381878
-
ISRAM: Information security risk analysis method
-
B. Karabacak, and I. Sogukpinar ISRAM: Information security risk analysis method Comput. Secur. 24 2005 147 159
-
(2005)
Comput. Secur.
, vol.24
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
40
-
-
0008942383
-
-
second ed. John Wiley & Sons New York
-
R. Anderson Security Engineering second ed. 2008 John Wiley & Sons New York
-
(2008)
Security Engineering
-
-
Anderson, R.1
-
41
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
C. Dougleris, and A. Mitrokotsa DDoS attacks and defense mechanisms: Classification and state-of-the-art Comput. Netw. 44 5 2004 643 666
-
(2004)
Comput. Netw.
, vol.44
, Issue.5
, pp. 643-666
-
-
Dougleris, C.1
Mitrokotsa, A.2
|