-
1
-
-
84939853687
-
Gartner says 4.9 billion connected 'Things' will Be in use in 2015
-
11 Nov.
-
J. Rivera, "Gartner Says 4.9 Billion Connected 'Things' Will Be in Use in 2015," Gartner, 11 Nov. 2014; www.gartner.com/newsroom/id/2905717.
-
(2014)
Gartner
-
-
Rivera, J.1
-
2
-
-
84936873176
-
Security of IoT systems: Design challenges and opportunities
-
X. Teng, J.B. Wendt, and M. Potkonjak, "Security of IoT Systems: Design Challenges and Opportunities," Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 14), 2014, pp. 417-423.
-
(2014)
Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 14)
, pp. 417-423
-
-
Teng, X.1
Wendt, J.B.2
Potkonjak, M.3
-
3
-
-
84920264400
-
-
white paper, SANS Inst., Jan.
-
J. Pescatore, Securing the Internet of Things Survey, white paper, SANS Inst., Jan. 2014; www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785.
-
(2014)
Securing the Internet of Things Survey
-
-
Pescatore, J.1
-
5
-
-
84897500787
-
Design and application spaces for IPv6 over low-power wireless personal area networks (6LoWPANs)
-
Apr.
-
E. Kim, D. Kaspar, and J. Vasseur, "Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)," Internet Engineering Task Force, Apr. 2012; https://tools.ietf.org/html/rfc6568.
-
(2012)
Internet Engineering Task Force
-
-
Kim, E.1
Kaspar, D.2
Vasseur, J.3
-
6
-
-
84891609361
-
-
ABIresearch, Feb.
-
"Indoor Location in Retail: Where Is the Money?," ABIresearch, Feb. 2013; www.abiresearch.com/market-research/product/1013925-indoor-location-in-retail-where-is-the-mon.
-
(2013)
Indoor Location in Retail: Where is the Money?
-
-
-
7
-
-
84962039290
-
The emergence of bluetooth low energy
-
21 May
-
S. Lester, "The Emergence of Bluetooth Low Energy," Context, 21 May 2015; www.contextis.com/resources/blog/emergence-bluetooth-low-energy.
-
(2015)
Context
-
-
Lester, S.1
-
8
-
-
84962359508
-
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
-
C. Kolias et al., "Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset," IEEE Communications Surveys & Tutorials, vol. PP, no. 99, 2015; doi:10.1109/COMST.2015.2402161.
-
(2015)
IEEE Communications Surveys & Tutorials
, vol.PP
, Issue.99
-
-
Kolias, C.1
-
9
-
-
73949128114
-
Zigbee-2007 security essentials
-
E. Yuksel, H. Nielson, and F. Nielson, "Zigbee-2007 Security Essentials," Proc. 13th Nordic Workshop Secure IT Systems (NordSec 08), 2008, pp. 65-82.
-
(2008)
Proc. 13th Nordic Workshop Secure IT Systems (NordSec 08)
, pp. 65-82
-
-
Yuksel, E.1
Nielson, H.2
Nielson, F.3
-
11
-
-
84962035270
-
-
Open Web Application Security Project
-
"Internet of Things Top Ten," Open Web Application Security Project, 2014; www.owasp.org/images/7/71/Internet-of-Things-Top-Ten-2014-OWASP.pdf.
-
(2014)
Internet of Things Top Ten
-
-
-
12
-
-
84962035301
-
Is it possible to secure micro-controllers used within IoT?
-
27 Aug.
-
A. Ardiri, "Is It Possible to Secure Micro-Controllers Used within IoT?" Evothings, 27 Aug. 2014; https://evothings.com/is-it-possible-to-secure-micro-controllers-used-within-iot.
-
(2014)
Evothings
-
-
Ardiri, A.1
-
14
-
-
84864196426
-
A testing framework for discovering vulnerabilities in 6LoWPAN networks
-
A. Lahmadi, C. Brandin, and O. Festor, "A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks," Proc. IEEE 8th Int'l Conf. Distributed Computing in Sensor Systems (DCOSS 12), 2012, pp. 335-340.
-
(2012)
Proc. IEEE 8th Int'l Conf. Distributed Computing in Sensor Systems (DCOSS 12)
, pp. 335-340
-
-
Lahmadi, A.1
Brandin, C.2
Festor, O.3
-
15
-
-
84962027851
-
Test suite design methodology using combinatorial approach for internet of things operating systems
-
A.H. Patil, N. Goveas, and K. Rangarajan, "Test Suite Design Methodology Using Combinatorial Approach for Internet of Things Operating Systems," J. Software Eng. Applications, vol. 8, no. 7, 2015, p. 303.
-
(2015)
J. Software Eng. Applications
, vol.8
, Issue.7
, pp. 303
-
-
Patil, A.H.1
Goveas, N.2
Rangarajan, K.3
-
16
-
-
84903581673
-
Combinatorial testing for an automotive hybrid electric vehicle control system: A case study
-
G. Dhadyalla, N. Kumari, and T. Snell, "Combinatorial Testing for an Automotive Hybrid Electric Vehicle Control System: A Case Study," Proc. IEEE 7th Int'l Conf. Software Testing, Verification and Validation Workshops (ICSTW 14), 2014, pp. 51-57.
-
(2014)
Proc. IEEE 7th Int'l Conf. Software Testing, Verification and Validation Workshops (ICSTW 14)
, pp. 51-57
-
-
Dhadyalla, G.1
Kumari, N.2
Snell, T.3
-
18
-
-
84943270223
-
-
National Inst. Standards and Technology, 11 Aug.
-
"Cyber-Physical Systems Public Working Group," National Inst. Standards and Technology, 11 Aug. 2014; www.nist.gov/cps/cps-pwg-workshop.cfm.
-
(2014)
Cyber-Physical Systems Public Working Group
-
-
-
19
-
-
79954605963
-
-
tech. report Revision 1, National Inst. Standards and Technology, Sept.
-
Guidelines for Smart Grid Cyber Security, tech. report NISTIR 7628 Revision 1, National Inst. Standards and Technology, Sept. 2014; http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf.
-
(2014)
Guidelines for Smart Grid Cyber Security
-
-
|