-
1
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1389128613000054
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
2
-
-
80052854156
-
Securing the internet of things
-
Sept
-
R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things, " Computer, vol. 44, no. 9, pp. 51-58, Sept 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
3
-
-
84919372488
-
Security, privacy and trust in Internet of Things: The road ahead
-
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead, " Computer Networks, vol. 76, pp. 146-164, 2015. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1389128614003971
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.3
Coen-Porisini, A.4
-
6
-
-
84860302129
-
Security model and key technologies for the Internet of things
-
J.-C. Yang and B.-X. Fang, "Security model and key technologies for the Internet of things, " The Journal of China Universities of Posts and Telecommunications, vol. 18, Supplement 2, pp. 109-112, 2011. [Online]. Available: http: //www. sciencedirect. com/science/article/pii/S1005888510601598
-
(2011)
The Journal of China Universities of Posts and Telecommunications
, vol.18
, pp. 109-112
-
-
Yang, J.-C.1
Fang, B.-X.2
-
7
-
-
84885225988
-
Risk-based adaptive security for smart iot in ehealth
-
H. Abie and I. Balasingham, "Risk-based Adaptive Security for Smart IoT in eHealth, " in Proceedings of the 7th International Conference on Body Area Networks, ser. BodyNets'12. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2012, pp. 269-275. [Online]. Available: http: //dl. acm. org/citation. cfm?id=2442691. 2442752
-
(2012)
Proceedings of the 7th International Conference on Body Area Networks, Ser. BodyNets'12. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
, pp. 269-275
-
-
Abie, H.1
Balasingham, I.2
-
8
-
-
84938683584
-
Applying large-scale adaptive graphs to modeling internet of things security
-
New York, NY, USA: ACM
-
T. Stepanova and D. Zegzhda, "Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security, " in Proceedings of the 7th International Conference on Security of Information and Networks, ser. SIN'14. New York, NY, USA: ACM, 2014, pp. 479-482. [Online]. Available: http: //doi. acm. org/10. 1145/2659651. 2659696
-
(2014)
Proceedings of the 7th International Conference on Security of Information and Networks, Ser. SIN'14
, pp. 479-482
-
-
Stepanova, T.1
Zegzhda, D.2
-
9
-
-
84914816062
-
Information fusion to defend intentional attack in internet of things
-
Aug
-
P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Information Fusion to Defend Intentional Attack in Internet of Things, " IEEE Internet of Things Journal, vol. 1, no. 4, pp. 337-348, Aug 2014.
-
(2014)
IEEE Internet of Things Journal
, vol.1
, Issue.4
, pp. 337-348
-
-
Chen, P.-Y.1
Cheng, S.-M.2
Chen, K.-C.3
-
11
-
-
84947766643
-
A game-theoretic approach for minimizing security risks in the internet-of-things
-
G. Rontidis, E. Panaousisy, A. Laszkaz, T. Dagiuklas, P. Malacariax, and T. Alpcan, "A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things, " in IEEE Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IEEE ICC 2015-IoT/CPS Security 2015), 2015.
-
(2015)
IEEE Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IEEE ICC 2015-IoT/CPS Security 2015)
-
-
Rontidis, G.1
Panaousisy, E.2
Laszkaz, A.3
Dagiuklas, T.4
Malacariax, P.5
Alpcan, T.6
-
12
-
-
10644248607
-
Automated generation and analysis of attack graphs
-
Tech. Rep.
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated Generation and Analysis of Attack Graphs, " CMU, Tech. Rep., 2002.
-
(2002)
CMU
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
14
-
-
84964580815
-
Assessing the effectiveness of moving target defenses using security models
-
J. Hong and D. Kim, "Assessing the Effectiveness of Moving Target Defenses using Security Models, " IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, pp. 1-1, 2015.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
, vol.PP
, Issue.99
, pp. 1
-
-
Hong, J.1
Kim, D.2
-
16
-
-
79951723271
-
A survey on wireless body area networks
-
Jan.
-
B. Latre, B. Braem, I. Moerman, C. Blondia, and P. Demeester, "A Survey on Wireless Body Area Networks, " Wirel. Netw., vol. 17, no. 1, pp. 1-18, Jan. 2011. [Online]. Available: http: //dx. doi. org/10. 1007/s11276-010-0252-4
-
(2011)
Wirel. Netw.
, vol.17
, Issue.1
, pp. 1-18
-
-
Latre, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
17
-
-
50249125456
-
A low-delay protocol for multihopwireless body area networks
-
Aug
-
B. Latre, B. Braem, I. Moerman, C. Blondia, E. Reusens, W. Joseph, and P. Demeester, "A Low-delay Protocol for MultihopWireless Body Area Networks, " in 4th Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, 2007. (MobiQuitous 2007), Aug 2007, pp. 1-8.
-
(2007)
4th Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, 2007. (MobiQuitous 2007)
, pp. 1-8
-
-
Latre, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Reusens, E.5
Joseph, W.6
Demeester, P.7
-
18
-
-
56449125017
-
A secure cross-layer protocol for multi-hop wireless body area networks
-
D. Coudert, D. Simplot-Ryl, and I. Stojmenovic, Eds. Springer Berlin Heidelberg
-
D. Singelee, B. Latre, B. Braem, M. Peeters, M. De Soete, P. De Cleyn, B. Preneel, I. Moerman, and C. Blondia, "A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks, " in Ad-hoc, Mobile and Wireless Networks, ser. Lecture Notes in Computer Science, D. Coudert, D. Simplot-Ryl, and I. Stojmenovic, Eds. Springer Berlin Heidelberg, 2008, vol. 5198, pp. 94-107. [Online]. Available: http: //dx. doi. org/10. 1007/978-3-540-85209-4-8
-
(2008)
Ad-hoc, Mobile and Wireless Networks, Ser. Lecture Notes in Computer Science
, vol.5198
, pp. 94-107
-
-
Singelee, D.1
Latre, B.2
Braem, B.3
Peeters, M.4
De Soete, M.5
De Cleyn, P.6
Preneel, B.7
Moerman, I.8
Blondia, C.9
-
19
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
New York, NY, USA: ACM
-
A. Woo, T. Tong, and D. Culler, "Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks, " in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ser. SenSys'03. New York, NY, USA: ACM, 2003, pp. 14-27. [Online]. Available: http: //doi. acm. org/10. 1145/958491. 958494
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Ser. SenSys'03
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
20
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA: ACM
-
L. Eschenauer and V. D. Gligor, "A Key-management Scheme for Distributed Sensor Networks, " in Proceedings of the 9th ACM Conference on Computer and Communications Security, ser. CCS'02. New York, NY, USA: ACM, 2002, pp. 41-47. [Online]. Available: http: //doi. acm. org/10. 1145/586110. 586117
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, Ser. CCS'02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
21
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
Sept
-
J. Deng, R. Han, and S. Mishra, "Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks, " in First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. (SecureComm 2005), Sept 2005, pp. 113-126.
-
(2005)
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. (SecureComm 2005)
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
|