-
1
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
“”
-
Alcaraz, C. and Lopez, J. (2010), “A security analysis for wireless sensor mesh networks in highly critical systems”, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 40 No. 4, pp. 419-428.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
2
-
-
77956877124
-
The Internet of Things: a survey
-
“”
-
Atzori, L., Iera, A. and Morabito, G. (2010), “The Internet of Things: a survey”, Computer Networks, Vol. 54 No. 15, pp. 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
84866034380
-
The Social Internet of Things (SIoT) – when social networks meet the Internet of Things: concept, architecture and network characterization
-
“”
-
Atzori, L., Iera, A., Morabito, G. and Nitti, M. (2012), “The Social Internet of Things (SIoT) – when social networks meet the Internet of Things: concept, architecture and network characterization”, Computer Networks, Vol. 56 No. 16, pp. 3594-3608.
-
(2012)
Computer Networks
, vol.56
, Issue.16
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
4
-
-
84961591745
-
-
“Internet of Things, SCADA, Ipv6 social networking”, :(accessed 14 December 2013)
-
Bamforth, R. (2014), “Internet of Things, SCADA, Ipv6 and social networking”, available at: www.it-director.com/business/innovation/content.php?cid=14590 (accessed 14 December 2013).
-
(2014)
-
-
Bamforth, R.1
-
5
-
-
84900826011
-
Internet of Things for enterprise systems of modern manufacturing
-
“”
-
Bi, Z., Xu, L. and Wang, C. (2014), “Internet of Things for enterprise systems of modern manufacturing”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1537-1546.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1537-1546
-
-
Bi, Z.1
Xu, L.2
Wang, C.3
-
6
-
-
39649090052
-
Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain
-
“”
-
Bottani, E. and Rizzi, A. (2008), “Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain”, International Journal of Production Economics, Vol. 112 No. 2, pp. 548-569.
-
(2008)
International Journal of Production Economics
, vol.112
, Issue.2
, pp. 548-569
-
-
Bottani, E.1
Rizzi, A.2
-
7
-
-
77955097686
-
Perci: pervasive service interaction with the Internet of Things
-
“”
-
Broll, G., Rukzio, E., Paolucci, M., Wagner, M., Schmidt, A. and Hussmann, H. (2009), “Perci: pervasive service interaction with the Internet of Things”, IEEE Internet Computing, Vol. 13 No. 6, pp. 74-81.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.6
, pp. 74-81
-
-
Broll, G.1
Rukzio, E.2
Paolucci, M.3
Wagner, M.4
Schmidt, A.5
Hussmann, H.6
-
8
-
-
84900809305
-
Iot-based configurable information service platform for product lifecycle management
-
“”
-
Cai, H., Xu, L., Xu, B., Xie, C., Qin, S. and Jiang, L. (2014), “Iot-based configurable information service platform for product lifecycle management”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1558-1567.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1558-1567
-
-
Cai, H.1
Xu, L.2
Xu, B.3
Xie, C.4
Qin, S.5
Jiang, L.6
-
9
-
-
84961591733
-
-
“Security requirements of Internet of Things”, :101-2012 Security Requirements of Internet of Things.pdf (accessed 1 March 2016)
-
CCSA (2012), “Security requirements of Internet of Things”, available at: ftp://ftp.onem2m.org/Pool/CCSA/YDB 101-2012 Security Requirements of Internet of Things.pdf (accessed 1 March 2016).
-
(2012)
-
-
-
10
-
-
84921730717
-
Time-reversal wireless paradigm for green Internet of Things: an overview
-
“”
-
Chen, Y., Han, F., Yang, Y.-H., Ma, H., Han, Y., Jiang, C., Lai, H.-Q., Claffey, D., Safar, Z. and Liu, K.R. (2014), “Time-reversal wireless paradigm for green Internet of Things: an overview”, IEEE Internet of Things Journal, Vol. 1 No. 1, pp. 81-98.
-
(2014)
IEEE Internet of Things Journal
, vol.1
, Issue.1
, pp. 81-98
-
-
Chen, Y.1
Han, F.2
Yang, Y.-H.3
Ma, H.4
Han, Y.5
Jiang, C.6
Lai, H.-Q.7
Claffey, D.8
Safar, Z.9
Liu, K.R.10
-
11
-
-
84867806916
-
A general distributed consensus algorithm for wireless sensor networks
-
“” London:
-
Choi, J., Li, S., Wang, X. and Ha, J. (2012), “A general distributed consensus algorithm for wireless sensor networks”, Wireless Advanced (WiAd), London, pp. 16-21.
-
(2012)
Wireless Advanced (WiAd)
, pp. 16-21
-
-
Choi, J.1
Li, S.2
Wang, X.3
Ha, J.4
-
12
-
-
84905103355
-
Security in wireless ad-hoc networks – a survey
-
“”
-
Di Pietro, R., Guarino, S., Verde, N. and Domingo-Ferrer, J. (2014), “Security in wireless ad-hoc networks – a survey”, Computer Communications, Vol. 51, pp. 1-20.
-
(2014)
Computer Communications
, vol.51
, pp. 1-20
-
-
Di Pietro, R.1
Guarino, S.2
Verde, N.3
Domingo-Ferrer, J.4
-
13
-
-
84961604189
-
Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz Version 1.0.9
-
“” , , :
-
EPCglobal (2004), “Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz Version 1.0.9”, Computer Communications, Vol. 51, pp. 1-20, available at: www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_0_9-standard-20050126.pdf
-
(2004)
Computer Communications
, vol.51
, pp. 1-20
-
-
EPCglobal, E.1
-
14
-
-
84961602174
-
-
“IT-security: Weblogic Server Oracle Platform Security Services (OPSS)”, :/ (accessed 5 July)
-
Esad-Djou, M. (2014), “IT-security: Weblogic Server and Oracle Platform Security Services (OPSS)”, available at: http://thecattlecrew.wordpress.com/2014/02/17/it-security-weblogic-server_1/ (accessed 5 July).
-
(2014)
-
-
Esad-Djou, M.1
-
15
-
-
84963744744
-
Principled design of the modern web architecture
-
“”
-
Fielding, R.T. and Taylor, R.N. (2002), “Principled design of the modern web architecture”, ACM Transactions on Internet Technology (TOIT), Vol. 2 No. 2, pp. 115-150.
-
(2002)
ACM Transactions on Internet Technology (TOIT)
, vol.2
, Issue.2
, pp. 115-150
-
-
Fielding, R.T.1
Taylor, R.N.2
-
16
-
-
85008059050
-
RFID application development with the accada middleware platform
-
“”
-
Floerkemeier, C., Roduner, C. and Lampe, M. (2007), “RFID application development with the accada middleware platform”, IEEE Systems Journal, Vol. 1 No. 2, pp. 82-94.
-
(2007)
IEEE Systems Journal
, vol.1
, Issue.2
, pp. 82-94
-
-
Floerkemeier, C.1
Roduner, C.2
Lampe, M.3
-
18
-
-
34547950128
-
Making security usable: are things improving?
-
“”
-
Furnell, S. (2007), “Making security usable: are things improving?”, Computers & Security, Vol. 26 No. 6, pp. 434-443.
-
(2007)
Computers & Security
, vol.26
, Issue.6
, pp. 434-443
-
-
Furnell, S.1
-
19
-
-
84856448398
-
Combining heterogeneous service technologies for building an Internet of Things middleware
-
“”
-
Gama, K., Touseau, L. and Donsez, D. (2012), “Combining heterogeneous service technologies for building an Internet of Things middleware”, Computer Communications, Vol. 35 No. 4, pp. 405-417.
-
(2012)
Computer Communications
, vol.35
, Issue.4
, pp. 405-417
-
-
Gama, K.1
Touseau, L.2
Donsez, D.3
-
20
-
-
84961628404
-
-
“Internet of Things: thinking services”, :(accessed 5 July 2014)
-
Gaur, H. (2013), “Internet of Things: thinking services”, available at: https://blogs.oracle.com/IOT/entry/internet_of_things_thinking_services (accessed 5 July 2014).
-
(2013)
-
-
Gaur, H.1
-
21
-
-
84902106352
-
Trust management mechanism for Internet of Things
-
“”
-
Gu, L., Wang, J. and Sun, B. (2014), “Trust management mechanism for Internet of Things”, China Communications, Vol. 11 No. 2, pp. 148-156.
-
(2014)
China Communications
, vol.11
, Issue.2
, pp. 148-156
-
-
Gu, L.1
Wang, J.2
Sun, B.3
-
22
-
-
77956394831
-
Interacting with the SOA-based Internet of Things: discovery, query, selection, and on-demand provisioning of web services
-
“”
-
Guinard, D., Trifa, V., Karnouskos, S., Spiess, P. and Savio, D. (2010), “Interacting with the SOA-based Internet of Things: discovery, query, selection, and on-demand provisioning of web services”, IEEE Transactions on Services Computing, Vol. 3 No. 3, pp. 223-235.
-
(2010)
IEEE Transactions on Services Computing
, vol.3
, Issue.3
, pp. 223-235
-
-
Guinard, D.1
Trifa, V.2
Karnouskos, S.3
Spiess, P.4
Savio, D.5
-
23
-
-
84898426599
-
Integration of distributed enterprise applications: a survey
-
“”
-
He, W., Xu, L. and Li, S. (2012), “Integration of distributed enterprise applications: a survey”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 1, pp. 35-42.
-
(2012)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.1
, pp. 35-42
-
-
He, W.1
Xu, L.2
Li, S.3
-
24
-
-
33845338757
-
The impact of enterprise systems on corporate performance: a study of ERP, SCM, and CRM system implementations
-
“”
-
Hendricks, K.B., Singhal, V.R. and Stratman, J.K. (2007), “The impact of enterprise systems on corporate performance: a study of ERP, SCM, and CRM system implementations”, Journal of Operations Management, Vol. 25 No. 1, pp. 65-82.
-
(2007)
Journal of Operations Management
, vol.25
, Issue.1
, pp. 65-82
-
-
Hendricks, K.B.1
Singhal, V.R.2
Stratman, J.K.3
-
25
-
-
35148881036
-
Harvesting Wiki consensus: using Wikipedia entries as vocabulary for knowledge management
-
“”
-
Hepp, M., Siorpaes, K. and Bachlechner, D. (2007), “Harvesting Wiki consensus: using Wikipedia entries as vocabulary for knowledge management”, IEEE Internet Computing, Vol. 11 No. 5, pp. 54-65.
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.5
, pp. 54-65
-
-
Hepp, M.1
Siorpaes, K.2
Bachlechner, D.3
-
26
-
-
84961628281
-
-
“Cryptanalysis of the SASI ultra-light weight RFID authentication protocol”, ArXiv, :(accessed 20 May)
-
Hernandez-Castro, J.C., Tapiador, J.M.E., Peris-Lopez, P., Li, T. and Quisquater, J.-J. (2013), “Cryptanalysis of the SASI ultra-light weight RFID authentication protocol”, ArXiv, available at: http://arxiv.org/abs/0811.4257 (accessed 20 May).
-
(2013)
-
-
Hernandez-Castro, J.C.1
Tapiador, J.M.E.2
Peris-Lopez, P.3
Li, T.4
Quisquater, J.-J.5
-
27
-
-
0036608181
-
Investment in enterprise resource planning: business impact and productivity measures
-
“”
-
Hitt, L.M., Wu, D. and Zhou, X. (2002), “Investment in enterprise resource planning: business impact and productivity measures”, Journal of Management Information Systems, Vol. 19 No. 1, pp. 71-98.
-
(2002)
Journal of Management Information Systems
, vol.19
, Issue.1
, pp. 71-98
-
-
Hitt, L.M.1
Wu, D.2
Zhou, X.3
-
28
-
-
84992733730
-
The RQ-tech methodology: a new paradigm for conceptualizing strategic enterprise architectures
-
“”
-
Hoyland, C.A., Adams, K.M., Tolk, A. and Xu, L.D. (2014), “The RQ-tech methodology: a new paradigm for conceptualizing strategic enterprise architectures”, Journal of Management Analytics, Vol. 1 No. 1, pp. 55-77.
-
(2014)
Journal of Management Analytics
, vol.1
, Issue.1
, pp. 55-77
-
-
Hoyland, C.A.1
Adams, K.M.2
Tolk, A.3
Xu, L.D.4
-
29
-
-
84961638028
-
-
“Internet of Things research study”, :(accessed 5 September)
-
HP Company (2014), “Internet of Things research study”, available at: http://h30499.www3.hp.com/hpeb/attachments/hpeb/application-security-fortify-on-demand/189/1/HP_IoT_Research_Study.pdf (accessed 5 September).
-
(2014)
-
-
-
30
-
-
84961602765
-
-
“The Internet of Things, International Telecommunication Union (ITU) Internet Report”,London:
-
ITU (2013), “The Internet of Things, International Telecommunication Union (ITU) Internet Report”, London.
-
(2013)
-
-
-
31
-
-
84900810686
-
An interactive trust model for application market of the Internet of Things
-
“”
-
Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C. (2014), “An interactive trust model for application market of the Internet of Things”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1516-1526.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1516-1526
-
-
Kang, K.1
Pang, Z.2
Da Xu, L.3
Ma, L.4
Wang, C.5
-
32
-
-
84919978090
-
Securing the Internet of Things: a standardization perspective
-
“”
-
Keoh, S., Kumar, S. and Tschofenig, H. (2014), “Securing the Internet of Things: a standardization perspective”, IEEE Internet of Things Journal, Vol. 1 No. 3, pp. 265-275.
-
(2014)
IEEE Internet of Things Journal
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.1
Kumar, S.2
Tschofenig, H.3
-
33
-
-
84871397265
-
Security and vulnerability of SCADA systems over IP-based wireless sensor networks
-
“” , Article ID 268478,10.1155/2012/268478
-
Kim, H. (2012), “Security and vulnerability of SCADA systems over IP-based wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 268478, pp. 1-10. doi: 10.1155/2012/268478.
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
, pp. 1-10
-
-
Kim, H.1
-
34
-
-
84961591722
-
-
“The Internet of Things,”(versión electrónica), :& hl=en
-
Kranenburg, R.V., Anzelmo, E., Bassi, A., Caprio, D., Dodson, S. and Ratto, M. (2011), “The Internet of Things,” 1st Berlin Symposium on Internet and Society (versión electrónica), available at: http://scholar.google.com/citations?user=oEr_DWAAAAAJ & hl=en
-
(2011)
-
-
Kranenburg, R.V.1
Anzelmo, E.2
Bassi, A.3
Caprio, D.4
Dodson, S.5
Ratto, M.6
-
35
-
-
81255151151
-
Enterprise systems: state-of-the-art and future trends
-
“”
-
Li, D.X. (2011), “Enterprise systems: state-of-the-art and future trends”, IEEE Transactions on Industrial Informatics, Vol. 7 No. 4, pp. 630-640.
-
(2011)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.4
, pp. 630-640
-
-
Li, D.X.1
-
36
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the Internet of Things
-
“”
-
Li, F. and Xiong, P. (2013), “Practical secure communication for integrating wireless sensor networks into the Internet of Things”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3677-3684.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3677-3684
-
-
Li, F.1
Xiong, P.2
-
37
-
-
84900823317
-
QoS-aware scheduling of services-oriented Internet of Things
-
a), “”
-
Li, L., Li, S. and Zhao, S. (2014a), “QoS-aware scheduling of services-oriented Internet of Things”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1497-1505.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1497-1505
-
-
Li, L.1
Li, S.2
Zhao, S.3
-
38
-
-
85019590394
-
An emergency resource allocation model for maritime chemical spill accidents
-
b), “”
-
Li, L., Wang, B. and Wang, A. (2014b), “An emergency resource allocation model for maritime chemical spill accidents”, Journal of Management Analytics, Vol. 1 No. 1, pp. 1-10.
-
(2014)
Journal of Management Analytics
, vol.1
, Issue.1
, pp. 1-10
-
-
Li, L.1
Wang, B.2
Wang, A.3
-
39
-
-
84925468156
-
The Internet of Things: a survey
-
c), “”
-
Li, S., Da Xu, L. and Zhao, S. (2014c), “The Internet of Things: a survey”, Information Systems Frontiers, Vol. 17 No. 2, pp. 243-259.
-
(2014)
Information Systems Frontiers
, vol.17
, Issue.2
, pp. 243-259
-
-
Li, S.1
Da Xu, L.2
Zhao, S.3
-
40
-
-
84907405630
-
Industrial wireless sensor networks
-
d), “” , Article ID 218050
-
Li, S., Sun, H., Nallanathan, A., Xu, L., Zhao, S. and Sun, Q. (2014d), “Industrial wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol. 2014, Article ID 218050, pp. 1-2.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
, pp. 1-2
-
-
Li, S.1
Sun, H.2
Nallanathan, A.3
Xu, L.4
Zhao, S.5
Sun, Q.6
-
41
-
-
84880920418
-
RFID in the warehouse: a literature analysis (1995-2010) of its applications, benefits, challenges and future trends
-
“”
-
Lim, M.K., Bahr, W. and Leung, S.C. (2013), “RFID in the warehouse: a literature analysis (1995-2010) of its applications, benefits, challenges and future trends”, International Journal of Production Economics, Vol. 145 No. 1, pp. 409-430.
-
(2013)
International Journal of Production Economics
, vol.145
, Issue.1
, pp. 409-430
-
-
Lim, M.K.1
Bahr, W.2
Leung, S.C.3
-
42
-
-
84861997111
-
Internet of Things: vision, applications and research challenges
-
“”
-
Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I. (2012), “Internet of Things: vision, applications and research challenges”, Ad Hoc Networks, Vol. 10 No. 7, pp. 1497-1516.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
43
-
-
84961668999
-
-
“Disruptive civil technologies: six technologies with potential impacts on US interests out to 2025”, conference report
-
National Intelligence Council (2008), “Disruptive civil technologies: six technologies with potential impacts on US interests out to 2025”, conference report.
-
(2008)
-
-
National Intelligence Council, N.I.C.1
-
45
-
-
84876156481
-
Cyberentity security in the Internet of Things
-
“”
-
Ning, H., Liu, H. and Yang, L.T. (2013), “Cyberentity security in the Internet of Things”, Computer, Vol. 46 No. 4, pp. 0046-0053.
-
(2013)
Computer
, vol.46
, Issue.4
, pp. 0046-0053
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
46
-
-
80052863388
-
Security and privacy in an online world
-
“”
-
Oppliger, R. (2011), “Security and privacy in an online world”, Computer, Vol. 44 No. 9, pp. 21-22.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 21-22
-
-
Oppliger, R.1
-
47
-
-
33750067948
-
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
-
“” Springer, Berlin:
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M. and Ribagorda, A. (2006), “M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags”, Ubiquitous Intelligence and Computing, Springer, Berlin, pp. 912-923.
-
(2006)
Ubiquitous Intelligence and Computing
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
48
-
-
84961669010
-
-
“Security 101: securing SCADA environments”, :(accessed 5 July 2014)
-
Perna, M. (2013), “Security 101: securing SCADA environments”, available at: http://blog.fortinet.com/post/security-101-securing-scada-environments (accessed 5 July 2014).
-
(2013)
-
-
Perna, M.1
-
49
-
-
84961564190
-
-
“The next evolution of the internet”, :(accessed 20 May)
-
Pretz, K. (2013), “The next evolution of the internet”, available at: http://theinstitute.ieee.org/technology-focus/technology-topic/the-next-evolution-of-the-internet (accessed 20 May).
-
(2013)
-
-
Pretz, K.1
-
50
-
-
84874292014
-
-
“”
-
Raza, S., Voigt, T. and Jutvik, V. (2012), “Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security”, Proceedings of the IETF Workshop on Smart Object Security, Paris, 23 March.
-
(2012)
Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security
-
-
Raza, S.1
Voigt, T.2
Jutvik, V.3
-
51
-
-
84883314073
-
Lithe: lightweight secure CoAP for the Internet of Things
-
“”
-
Raza, S., Shafagh, H., Hewage, K., Hummen, R. and Voigt, T. (2013), “Lithe: lightweight secure CoAP for the Internet of Things”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3711-3720.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
52
-
-
84961638016
-
-
“Top 5 Internet of Things security concerns”, :(accessed 5 September)
-
Roe, D. (2014), “Top 5 Internet of Things security concerns”, available at: www.cmswire.com/cms/internet-of-things/top-5-internet-of-things-security-concerns-026043.php (accessed 5 September).
-
(2014)
-
-
Roe, D.1
-
53
-
-
80052854156
-
Securing the Internet of Things
-
“”
-
Roman, R., Najera, P. and Lopez, J. (2011), “Securing the Internet of Things”, Computer, Vol. 44 No. 9, pp. 51-58.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
54
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of Things
-
“”
-
Roman, R., Zhou, J. and Lopez, J. (2013), “On the features and challenges of security and privacy in distributed Internet of Things”, Computer Networks, Vol. 57 No. 10, pp. 2266-2279.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
55
-
-
78650942089
-
-
EUR-OP, Brussels:
-
Sundmaeker, H., Guillemin, P., Friess, P. and Woelfflé, S. (2010), Vision and Challenges for Realising the Internet of Things, EUR-OP, Brussels.
-
(2010)
Vision and Challenges for Realising the Internet of Things
-
-
Sundmaeker, H.1
Guillemin, P.2
Friess, P.3
Woelfflé, S.4
-
56
-
-
84925393501
-
A trust evaluation model for e-learning systems
-
“”
-
Tan, W., Chen, S., Li, J., Li, L., Wang, T. and Hu, X. (2014), “A trust evaluation model for e-learning systems”, Systems Research and Behavioral Science, Vol. 31 No. 3, pp. 353-365.
-
(2014)
Systems Research and Behavioral Science
, vol.31
, Issue.3
, pp. 353-365
-
-
Tan, W.1
Chen, S.2
Li, J.3
Li, L.4
Wang, T.5
Hu, X.6
-
57
-
-
84896931467
-
CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system
-
“”
-
Tao, F., Cheng, Y., Xu, L.D., Zhang, L. and Li, B.H. (2014), “CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1435-1442.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1435-1442
-
-
Tao, F.1
Cheng, Y.2
Xu, L.D.3
Zhang, L.4
Li, B.H.5
-
58
-
-
84878125540
-
A system framework of security management in enterprise systems
-
“”
-
Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y. and Li, X. (2013), “A system framework of security management in enterprise systems”, Systems Research and Behavioral Science, Vol. 30 No. 3, pp. 287-299.
-
(2013)
Systems Research and Behavioral Science
, vol.30
, Issue.3
, pp. 287-299
-
-
Wang, F.1
Ge, B.2
Zhang, L.3
Chen, Y.4
Xin, Y.5
Li, X.6
-
59
-
-
77953552937
-
Cooperative communications based on trust model for mobile ad hoc networks
-
“”
-
Wang, K. and Wu, M. (2010), “Cooperative communications based on trust model for mobile ad hoc networks”, IET Information Security, Vol. 4 No. 2, pp. 68-79.
-
(2010)
IET Information Security
, vol.4
, Issue.2
, pp. 68-79
-
-
Wang, K.1
Wu, M.2
-
60
-
-
84880234291
-
Internet of Things – governance quo vadis?
-
“”
-
Weber, R.H. (2013), “Internet of Things – governance quo vadis?”, Computer Law & Security Review, Vol. 29 No. 4, pp. 341-347.
-
(2013)
Computer Law & Security Review
, vol.29
, Issue.4
, pp. 341-347
-
-
Weber, R.H.1
-
61
-
-
67349277665
-
Building the Internet of Things using RFID: the RFID ecosystem experience
-
“”
-
Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M. and Borriello, G. (2009), “Building the Internet of Things using RFID: the RFID ecosystem experience”, IEEE Internet Computing, Vol. 13 No. 3, pp. 48-55.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.3
, pp. 48-55
-
-
Welbourne, E.1
Battle, L.2
Cole, G.3
Gould, K.4
Rector, K.5
Raymer, S.6
Balazinska, M.7
Borriello, G.8
-
62
-
-
30344462323
-
The impact of ERP systems on firm and business process performance
-
“”
-
Wieder, B., Booth, P., Matolcsy, Z.P. and Ossimitz, M.-L. (2006), “The impact of ERP systems on firm and business process performance”, Journal of Enterprise Information Management, Vol. 19 No. 1, pp. 13-29.
-
(2006)
Journal of Enterprise Information Management
, vol.19
, Issue.1
, pp. 13-29
-
-
Wieder, B.1
Booth, P.2
Matolcsy, Z.P.3
Ossimitz, M.-L.4
-
63
-
-
84900826157
-
User interoperability with heterogeneous IoT devices through transformation
-
“”
-
Xiao, G., Guo, J., Xu, L. and Gong, Z. (2014), “User interoperability with heterogeneous IoT devices through transformation”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1486-1496.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1486-1496
-
-
Xiao, G.1
Guo, J.2
Xu, L.3
Gong, Z.4
-
64
-
-
84900834753
-
Ubiquitous data accessing method in IoT-based information system for emergency medical services
-
a), “”
-
Xu, B., Xu, L.D., Cai, H., Xie, C., Hu, J. and Bu, F. (2014a), “Ubiquitous data accessing method in IoT-based information system for emergency medical services”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1578-1586.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1578-1586
-
-
Xu, B.1
Xu, L.D.2
Cai, H.3
Xie, C.4
Hu, J.5
Bu, F.6
-
65
-
-
84906834039
-
Internet of Things in industries: a survey
-
b), “”
-
Xu, L., He, W. and Li, S. (2014b), “Internet of Things in industries: a survey”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 4, pp. 2233-2243.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.4
, pp. 2233-2243
-
-
Xu, L.1
He, W.2
Li, S.3
-
66
-
-
78649487968
-
Information architecture for supply chain quality management
-
“”
-
Xu, L.D. (2011), “Information architecture for supply chain quality management”, International Journal of Production Research, Vol. 49 No. 1, pp. 183-198.
-
(2011)
International Journal of Production Research
, vol.49
, Issue.1
, pp. 183-198
-
-
Xu, L.D.1
-
67
-
-
84883421524
-
A lightweight multicast authentication mechanism for small scale IoT applications
-
“”
-
Yao, X., Han, X., Du, X. and Zhou, X. (2013), “A lightweight multicast authentication mechanism for small scale IoT applications”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3693-3701.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3693-3701
-
-
Yao, X.1
Han, X.2
Du, X.3
Zhou, X.4
-
68
-
-
84900794442
-
IoT-based smart rehabilitation system
-
“”
-
Yuan Jie, F., Yue Hong, Y., Li Da, X., Yan, Z. and Fan, W. (2014), “IoT-based smart rehabilitation system”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1568-1577.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1568-1577
-
-
Yuan Jie, F.1
Yue Hong, Y.2
Li Da, X.3
Yan, Z.4
Fan, W.5
|