메뉴 건너뛰기




Volumn 2016-January, Issue , 2016, Pages 776-781

A framework for modeling and assessing security of the internet of things

Author keywords

Attack Graphs; Hierarchical Attack Representation Model; Internet of Things; Security Analysis

Indexed keywords

INTERNET OF THINGS;

EID: 84964601616     PISSN: 15219097     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPADS.2015.102     Document Type: Conference Paper
Times cited : (34)

References (21)
  • 1
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1389128613000054
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 2
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Sept
    • R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things, " Computer, vol. 44, no. 9, pp. 51-58, Sept 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 3
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in Internet of Things: The road ahead
    • S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead, " Computer Networks, vol. 76, pp. 146-164, 2015. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1389128614003971
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.3    Coen-Porisini, A.4
  • 6
    • 84860302129 scopus 로고    scopus 로고
    • Security model and key technologies for the Internet of things
    • J.-C. Yang and B.-X. Fang, "Security model and key technologies for the Internet of things, " The Journal of China Universities of Posts and Telecommunications, vol. 18, Supplement 2, pp. 109-112, 2011. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1005888510601598
    • (2011) The Journal of China Universities of Posts and Telecommunications , vol.18 , pp. 109-112
    • Yang, J.-C.1    Fang, B.-X.2
  • 9
    • 84914816062 scopus 로고    scopus 로고
    • Information fusion to defend intentional attack in internet of things
    • Aug
    • P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Information Fusion to Defend Intentional Attack in Internet of Things, " IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337-348, Aug 2014.
    • (2014) IEEE Internet of Things Journal , vol.1 , Issue.4 , pp. 337-348
    • Chen, P.-Y.1    Cheng, S.-M.2    Chen, K.-C.3
  • 12
    • 10644248607 scopus 로고    scopus 로고
    • Automated generation and analysis of attack graphs
    • Tech. Rep.
    • O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated Generation and Analysis of Attack Graphs, " CMU, Tech. Rep., 2002.
    • (2002) CMU
    • Sheyner, O.1    Haines, J.2    Jha, S.3    Lippmann, R.4    Wing, J.5
  • 14
    • 84964580815 scopus 로고    scopus 로고
    • Assessing the effectiveness of moving target defenses using security models
    • J. Hong and D. Kim, "Assessing the Effectiveness of Moving Target Defenses using Security Models, " IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, pp. 1-1, 2015.
    • (2015) IEEE Transactions on Dependable and Secure Computing , vol.PP , Issue.99 , pp. 1
    • Hong, J.1    Kim, D.2
  • 16
    • 79951723271 scopus 로고    scopus 로고
    • A survey on wireless body area networks
    • Jan.
    • B. Latre, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A Survey on Wireless Body Area Networks, " Wirel. Netw., vol. 17, no. 1, pp. 1-18, Jan. 2011. [Online]. Available: http: //dx. doi. org/10. 1007/s11276-010-0252-4
    • (2011) Wirel. Netw. , vol.17 , Issue.1 , pp. 1-18
    • Latre, B.1    Braem, B.2    Moerman, I.3    Blondia, C.4    Demeester, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.