메뉴 건너뛰기




Volumn 14, Issue 1, 2016, Pages 37-46

Learning Internet-of-Things Security "Hands-On"

Author keywords

cloud; cybersecurity; hackers; Internet of Things; Internet Web technologies; IoT; privacy; security; smart technology; wearable computing; wearables

Indexed keywords

CLOUDS; DATA PRIVACY; INTERNET; PERSONAL COMPUTING; WEARABLE TECHNOLOGY;

EID: 84962010405     PISSN: 15407993     EISSN: 15584046     Source Type: Journal    
DOI: 10.1109/MSP.2016.4     Document Type: Article
Times cited : (115)

References (19)
  • 1
    • 84939853687 scopus 로고    scopus 로고
    • Gartner says 4.9 billion connected 'Things' will Be in use in 2015
    • 11 Nov.
    • J. Rivera, "Gartner Says 4.9 Billion Connected 'Things' Will Be in Use in 2015," Gartner, 11 Nov. 2014; www.gartner.com/newsroom/id/2905717.
    • (2014) Gartner
    • Rivera, J.1
  • 3
    • 84920264400 scopus 로고    scopus 로고
    • white paper, SANS Inst., Jan.
    • J. Pescatore, Securing the Internet of Things Survey, white paper, SANS Inst., Jan. 2014; www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785.
    • (2014) Securing the Internet of Things Survey
    • Pescatore, J.1
  • 5
    • 84897500787 scopus 로고    scopus 로고
    • Design and application spaces for IPv6 over low-power wireless personal area networks (6LoWPANs)
    • Apr.
    • E. Kim, D. Kaspar, and J. Vasseur, "Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)," Internet Engineering Task Force, Apr. 2012; https://tools.ietf.org/html/rfc6568.
    • (2012) Internet Engineering Task Force
    • Kim, E.1    Kaspar, D.2    Vasseur, J.3
  • 6
    • 84891609361 scopus 로고    scopus 로고
    • ABIresearch, Feb.
    • "Indoor Location in Retail: Where Is the Money?," ABIresearch, Feb. 2013; www.abiresearch.com/market-research/product/1013925-indoor-location-in-retail-where-is-the-mon.
    • (2013) Indoor Location in Retail: Where is the Money?
  • 7
    • 84962039290 scopus 로고    scopus 로고
    • The emergence of bluetooth low energy
    • 21 May
    • S. Lester, "The Emergence of Bluetooth Low Energy," Context, 21 May 2015; www.contextis.com/resources/blog/emergence-bluetooth-low-energy.
    • (2015) Context
    • Lester, S.1
  • 8
    • 84962359508 scopus 로고    scopus 로고
    • Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
    • C. Kolias et al., "Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset," IEEE Communications Surveys & Tutorials, vol. PP, no. 99, 2015; doi:10.1109/COMST.2015.2402161.
    • (2015) IEEE Communications Surveys & Tutorials , vol.PP , Issue.99
    • Kolias, C.1
  • 11
    • 84962035270 scopus 로고    scopus 로고
    • Open Web Application Security Project
    • "Internet of Things Top Ten," Open Web Application Security Project, 2014; www.owasp.org/images/7/71/Internet-of-Things-Top-Ten-2014-OWASP.pdf.
    • (2014) Internet of Things Top Ten
  • 12
    • 84962035301 scopus 로고    scopus 로고
    • Is it possible to secure micro-controllers used within IoT?
    • 27 Aug.
    • A. Ardiri, "Is It Possible to Secure Micro-Controllers Used within IoT?" Evothings, 27 Aug. 2014; https://evothings.com/is-it-possible-to-secure-micro-controllers-used-within-iot.
    • (2014) Evothings
    • Ardiri, A.1
  • 15
    • 84962027851 scopus 로고    scopus 로고
    • Test suite design methodology using combinatorial approach for internet of things operating systems
    • A.H. Patil, N. Goveas, and K. Rangarajan, "Test Suite Design Methodology Using Combinatorial Approach for Internet of Things Operating Systems," J. Software Eng. Applications, vol. 8, no. 7, 2015, p. 303.
    • (2015) J. Software Eng. Applications , vol.8 , Issue.7 , pp. 303
    • Patil, A.H.1    Goveas, N.2    Rangarajan, K.3
  • 18
    • 84943270223 scopus 로고    scopus 로고
    • National Inst. Standards and Technology, 11 Aug.
    • "Cyber-Physical Systems Public Working Group," National Inst. Standards and Technology, 11 Aug. 2014; www.nist.gov/cps/cps-pwg-workshop.cfm.
    • (2014) Cyber-Physical Systems Public Working Group
  • 19
    • 79954605963 scopus 로고    scopus 로고
    • tech. report Revision 1, National Inst. Standards and Technology, Sept.
    • Guidelines for Smart Grid Cyber Security, tech. report NISTIR 7628 Revision 1, National Inst. Standards and Technology, Sept. 2014; http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf.
    • (2014) Guidelines for Smart Grid Cyber Security


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.