-
1
-
-
84877727033
-
The internet of things-how the next evolution of the internet is changing everything
-
Cisco Internet Business Solutions Group (IBSG), "The internet of things-how the next evolution of the internet is changing everything," White Paper. Cisco Internet Business Solutions Group (IBSG), 2011.
-
D. Evans
-
(2011)
White Paper
-
-
Evans, D.1
-
2
-
-
84921464715
-
-
Gartner
-
P. Middleton, P. Kjeldsen, and J. Tully, "Forecast: The internet of things, worldwide, 2013," Gartner, 2013.
-
(2013)
Forecast: The Internet of Things, Worldwide, 2013
-
-
Middleton, P.1
Kjeldsen, P.2
Tully, J.3
-
3
-
-
33644591555
-
Wireless security threat taxonomy
-
Man Cybern. Soc. Inf. Assurance Workshop
-
D. Welch and S. Lathrop, "Wireless security threat taxonomy," in Proc. IEEE Syst., Man Cybern. Soc. Inf. Assurance Workshop, 2003, pp. 76-83.
-
(2003)
Proc. IEEE Syst.
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
4
-
-
80052854156
-
Securing the internet of things
-
Sep.
-
R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, no. 9, pp. 51-58, Sep. 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
5
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
7
-
-
84961703801
-
The future of personal area networks in a ubiquitous computing world
-
D. Viehland and F. Zhao, "The future of personal area networks in a ubiquitous computing world," Int. J. Adv. Pervasive Ubiquitous Comput., vol. 2, no. 2, pp. 30-44, 2010.
-
(2010)
Int. J. Adv. Pervasive Ubiquitous Comput.
, vol.2
, Issue.2
, pp. 30-44
-
-
Viehland, D.1
Zhao, F.2
-
8
-
-
79955795318
-
Smart cities and the future internet: Towards cooperation frameworks for open innovation
-
Berlin, Germany: Springer
-
H. Schaffers, N. Komninos, M. Pallot, B. Trousse, M. Nilsson, and A. Oliveira, "Smart cities and the future internet: Towards cooperation frameworks for open innovation," in The Future Internet, Berlin, Germany: Springer, 2011, pp. 431-446.
-
(2011)
The Future Internet
, pp. 431-446
-
-
Schaffers, H.1
Komninos, N.2
Pallot, M.3
Trousse, B.4
Nilsson, M.5
Oliveira, A.6
-
9
-
-
85002424663
-
Identify authentication and capability based access control (IACAC) for the internet of things
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identify authentication and capability based access control (IACAC) for the internet of things," J. Cyber Security Mobility, vol. 1, pp. 309-348, 2013.
-
(2013)
J. Cyber Security Mobility
, vol.1
, pp. 309-348
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
11
-
-
84883330172
-
A systemic approach for IoT security
-
A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, "A systemic approach for IoT security," in Proc. IEEE Int. Conf. Distrib. Comput. Sensor Syst., 2013, pp. 351-355.
-
(2013)
Proc. IEEE Int. Conf. Distrib. Comput. Sensor Syst.
, pp. 351-355
-
-
Riahi, A.1
Challal, Y.2
Natalizio, E.3
Chtourou, Z.4
Bouabdallah, A.5
-
12
-
-
84899512407
-
A systemic and cognitive approach for IoT security
-
Netw. Commun.
-
A. Riahi, E. Natalizio, Y. Challal, N. Mitton, and A. Iera, "A systemic and cognitive approach for IoT security," in Proc. Int. Conf. Comput., Netw. Commun., 2014, pp. 183-188.
-
(2014)
Proc. Int. Conf. Comput.
, pp. 183-188
-
-
Riahi, A.1
Natalizio, E.2
Challal, Y.3
Mitton, N.4
Iera, A.5
-
13
-
-
84961747222
-
-
[Online]
-
(2015). Nest Labs. Privacy statement [Online]. https://nest.com/ legal/privacy-statement/
-
(2015)
Nest Labs. Privacy Statement
-
-
-
14
-
-
84911900606
-
Privacy in the internet of things: Threats and challenges
-
J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, "Privacy in the internet of things: Threats and challenges," Security Commun. Netw., vol. 7, no. 12, pp. 2728-2742, 2014.
-
(2014)
Security Commun. Netw.
, vol.7
, Issue.12
, pp. 2728-2742
-
-
Ziegeldorf, J.H.1
Morchon, O.G.2
Wehrle, K.3
-
15
-
-
84978884955
-
The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation
-
A. D. Thierer, "The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation," Rich. J. Law Technol., vol. 21, pp. 6-15, 2015.
-
(2015)
Rich. J. Law Technol.
, vol.21
, pp. 6-15
-
-
Thierer, A.D.1
-
16
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
17
-
-
77957599265
-
Proposed security model and threat taxonomy for the internet of things (IoT)
-
S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, "Proposed security model and threat taxonomy for the internet of things (IoT)," in Proc. Recent Trends Netw. Security Appl.: 3rd Int. Conf., 2010, pp. 420-429.
-
(2010)
Proc. Recent Trends Netw. Security Appl.: 3rd Int. Conf.
, pp. 420-429
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
18
-
-
0000474763
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. Adv. Cryptol., 1999, pp. 789-789.
-
(1999)
Proc. Adv. Cryptol.
, pp. 789
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
84901244508
-
Constrained application protocol (CoAP), draft-ietf-core-coap-13
-
Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained application protocol (CoAP), draft-ietf-core-coap-13," in The Internet Engineering Task Force (IETF), 2012.
-
(2012)
The Internet Engineering Task Force (IETF)
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Frank, B.4
-
23
-
-
84867755083
-
End-toend transport security in the IP-based internet of things
-
M. Brachmann, S. L. Keoh, O. Morchon, and S. Kumar, "End-toend transport security in the ip-based internet of things," in Proc. 21st Int. Conf. Comput. Commun. Netw., 2012, pp. 1-5.
-
(2012)
Proc. 21st Int. Conf. Comput. Commun. Netw.
, pp. 1-5
-
-
Brachmann, M.1
Keoh, S.L.2
Morchon, O.3
Kumar, S.4
-
24
-
-
84922498877
-
-
Ph.D. dissertation, Univ. Duisburg-Essen, Essen, Germany
-
R. Seggelmann, "Sctp: Strategies to secure end-to-end communication," Ph.D. dissertation, Univ. Duisburg-Essen, Essen, Germany, 2012.
-
(2012)
Sctp: Strategies to Secure End-to-end Communication
-
-
Seggelmann, R.1
-
26
-
-
84893423195
-
Innovative instruction and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. Rozas, H. Shafi, V. Shanbhogue, and U. Savagaonkar, "Innovative instruction and software model for isolated execution," in Proc. 2nd Int. Workshop Hardware Architectural Support Security Privacy, 2013.
-
(2013)
Proc. 2nd Int. Workshop Hardware Architectural Support Security Privacy
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.7
-
27
-
-
84897781978
-
Innovative technology for cpu based attestation and sealing
-
I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata, "Innovative technology for cpu based attestation and sealing," in Proc. 2nd Int. Workshop Hardware Architectural Support Security Privacy, 2013.
-
(2013)
Proc. 2nd Int. Workshop Hardware Architectural Support Security Privacy
-
-
Anati, I.1
Gueron, S.2
Johnson, S.P.3
Scarlata, V.R.4
-
30
-
-
84943284595
-
Reflections on trusting trustzone
-
D. Rosenberg, "Reflections on trusting trustzone," in BlackHat USA, 2014.
-
(2014)
BlackHat USA
-
-
Rosenberg, D.1
-
31
-
-
84961701931
-
To swipe or not to swipe: A challenge for your fingers
-
T. Wei and Y. Zhang, "To swipe or not to swipe: A challenge for your fingers," in Proc. RSA Conf., 2015.
-
(2015)
Proc. RSA Conf.
-
-
Wei, T.1
Zhang, Y.2
-
33
-
-
50249101574
-
Performance comparison of VxWorks, Linux, RTAI and Xenomai in a hard real-time application
-
A. Barbalace, A. Luchetta, G. Manduchi, M. Moro, A. Soppelsa, and C. Taliercio, "Performance comparison of VxWorks, Linux, RTAI and Xenomai in a hard real-time application," in Proc. 15th IEEE-NPSS Real-Time Conf., 2007, pp. 1-5.
-
(2007)
Proc. 15th IEEE-NPSS Real-Time Conf.
, pp. 1-5
-
-
Barbalace, A.1
Luchetta, A.2
Manduchi, G.3
Moro, M.4
Soppelsa, A.5
Taliercio, C.6
-
34
-
-
84961729265
-
-
[Online]. Available
-
(1982-2014). QNX operating systems [Online]. Available: http:// www.qnx.com/products/neutrino-rtos/index.html
-
(1982)
QNX Operating Systems
-
-
-
41
-
-
84890588314
-
Stealthy dopant-level hardware trojans
-
G. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, "Stealthy dopant-level hardware trojans," in Proc. 15th Int. Conf. Cryptographic Hardware Embedded Syst., 2013, pp. 197-214.
-
(2013)
Proc. 15th Int. Conf. Cryptographic Hardware Embedded Syst.
, pp. 197-214
-
-
Becker, G.1
Regazzoni, F.2
Paar, C.3
Burleson, W.P.4
-
44
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. IEEE Symp. Security Privacy, 2008, pp. 129-142.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
45
-
-
84961712778
-
-
no. 026119 Rev 5
-
ST Microelectronics, "STM32L15xQC, STM32L15xRC-A, STM32L 15xVC-A, STM32L15xZC Ultra-low-power 32b MCU ARM-based Cortex-M3, 256KB Flash 32KB SRAM, 8KB EEPROM, LCD, USB, ADC, DAC," no. 026119 Rev 5, 2015.
-
(2015)
STM32L15xQC, STM32L15xRC-A, STM32L 15xVC-A, STM32L15xZC Ultra-low-power 32b MCU ARM-based Cortex-M3, 256KB Flash 32KB SRAM, 8KB EEPROM, LCD, USB, ADC, DAC
-
-
ST Microelectronics1
-
46
-
-
34250017239
-
A face is exposed for aol searcher no. 4417749
-
M. BARBARO and T. Zeller Jr., "A face is exposed for aol searcher no. 4417749," The New York Times, 2006.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
50
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
W. Arbaugh, D. Farber, and J. Smith, "A secure and reliable bootstrap architecture," in Proc. IEEE Symp. Security Privacy, 1997, pp. 65-71.
-
(1997)
Proc. IEEE Symp. Security Privacy
, pp. 65-71
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
|