-
2
-
-
84861758974
-
The internet of things-how the next evolution of the internet is changing everything
-
April
-
D. Evans, "The Internet of Things-How the Next Evolution of the Internet is Changing Everything, " Cisco Internet Business Solutions Group (IBSG), April, 2011.
-
(2011)
Cisco Internet Business Solutions Group (IBSG)
-
-
Evans, D.1
-
3
-
-
84964577386
-
-
Veracode. com. [Accessed: 14-Jul-2015]
-
Veracode. com, "The Internet of Things: Security Research Study, " 2015. [Online]. Available:https://www. veracode. com/sites/default/files/Resources/Whitepapers/internet-of-things-whitepaper. pdf. [Accessed: 14-Jul-2015].
-
(2015)
The Internet of Things: Security Research Study
-
-
-
4
-
-
84922552115
-
User-driven privacy enforcement for cloud-based services in the internet of things
-
IEEE
-
M. Henze, L. Hermerschmidt, D. Kerpen, R. Haussling, B. Rumpe, and K. Wehrle. "User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things, " 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 191-196. IEEE, 2014.
-
(2014)
2014 International Conference on Future Internet of Things and Cloud (FiCloud)
, pp. 191-196
-
-
Henze, M.1
Hermerschmidt, L.2
Kerpen, D.3
Haussling, R.4
Rumpe, B.5
Wehrle, K.6
-
5
-
-
84952042114
-
Big data privacy in the internet of things era
-
C. Perera, R. Ranjan, L. Wang, S. U. Khan, and A. Y. Zomaya. "Big Data Privacy in the Internet of Things Era, " IT Professional, 17, no. 3, pp. 32-39, 2015.
-
(2015)
IT Professional
, vol.17
, Issue.3
, pp. 32-39
-
-
Perera, C.1
Ranjan, R.2
Wang, L.3
Khan, S.U.4
Zomaya, A.Y.5
-
7
-
-
84964650581
-
Security announcement from smart things
-
SmartThings, "Security Announcement from SmartThings, " 2015.
-
(2015)
Smart Things
-
-
-
8
-
-
84964577371
-
Smart home invasion
-
[Accessed: 07-Aug-2015]
-
C. Young, "Smart Home Invasion, " DEF CON 23 IoT Village. [Online]. Available: https://www. iotvillage. org/slides-DC23/CRAIG-YOUNG-IoT-Village-Smart-Home-Invasion. pdf. [Accessed: 07-Aug-2015].
-
DEF CON 23 IoT Village.
-
-
Young, C.1
-
9
-
-
84964618476
-
-
NCC Group Intern Whitepaper, June 29. [Accessed: 11-Sep-2015]
-
B. Belleville, P. Biernat, A. Cotenoff, K. Hock, T. Prynn, S. Sankaralingam, T. Sun, and D. Mayer, "Internet of Things Security, " NCC Group Intern Whitepaper, June 29, 2015. [Online]. Available: https://www. nccgroup. trust/us/our-research/internet-of-things-security/. [Accessed: 11-Sep-2015]
-
(2015)
Internet of Things Security
-
-
Belleville, B.1
Biernat, P.2
Cotenoff, A.3
Hock, K.4
Prynn, T.5
Sankaralingam, S.6
Sun, T.7
Mayer, D.8
-
10
-
-
84943163749
-
Smart things ssl certificate validation vulnerability
-
March 4, [Accessed: 19-Sep-2015]
-
D. Bastone, "SmartThings SSL Certificate Validation Vulnerability, " Gotham Digital Science Blog, March 4, 2015. [Online]. Available: https://blog. gdssecurity. com/labs/2015/3/4/smartthings-ssl-certificate-validation-vulnerability. html. [Accessed: 19-Sep-2015].
-
(2015)
Gotham Digital Science Blog
-
-
Bastone, D.1
-
11
-
-
84964657247
-
Technology evolution, people, and privacy
-
A press
-
M. Dennedy, J. Fox, and T. R. Finneran. "Technology Evolution, People, and Privacy, " The Privacy Engineer's Manifesto, pp. 3-24, Apress, 2014.
-
(2014)
The Privacy Engineer's Manifesto
, pp. 3-24
-
-
Dennedy, M.1
Fox, J.2
Finneran, T.R.3
-
12
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Springer Berlin Heidelberg
-
J. Raymond, "Traffic analysis: Protocols, Attacks, Design Issues, and Open Problems, " Designing Privacy Enhancing Technologies, pp. 10-29, Springer Berlin Heidelberg, 2001.
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 10-29
-
-
Raymond, J.1
-
13
-
-
84875537166
-
Security threats in zigbee-enabled systems:vulnerability evaluation, practical experiments, countermeasures, and lessons learned
-
N. Vidgren, K. Haataja, J. Patino-Andres, J. Ram?rez-Sanchis and P. Toivanen, "Security Threats in ZigBee-Enabled Systems:Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned, " 46th IEEE Hawaii International Conference on System Sciences, pp. 5132-5138, 2013.
-
(2013)
46th IEEE Hawaii International Conference on System Sciences
, pp. 5132-5138
-
-
Vidgren, N.1
Haataja, K.2
Patino-Andres, J.3
Ramrez-Sanchis, J.4
Toivanen, P.5
-
14
-
-
84964635068
-
-
Zigbee. org. [Accessed: 20-Jun-2015]
-
Zigbee. org, "Open Standards Development, " 2015. [Online]. Available: http://www. zigbee. org/zigbeealliance/developing-standards/. [Accessed: 20-Jun-2015].
-
(2015)
Open Standards Development
-
-
-
15
-
-
84964577350
-
-
Wireshark. org. [Accessed: 20-Jun-2015]
-
Wireshark. org, "Wireshark, " 2015. [Online]. Available: https://www. wireshark. org/. [Accessed: 20-Jun-2015].
-
(2015)
-
-
-
16
-
-
33847161898
-
Provider provisioned virtual private network (VPN) terminology
-
L. Andersson, and T. Madsen, "Provider Provisioned Virtual Private Network (VPN) Terminology, " RFC 4026. 2005.
-
(2005)
RFC
, vol.4026
-
-
Andersson, L.1
Madsen, T.2
-
17
-
-
84943172221
-
Experiments with security and privacy in iot networks
-
M. Schurgot, D. Shinberg and L. Greenwald, "Experiments with Security and Privacy in IoT Networks, " IEEE WoWMoM, DOI: 10. 1109/WoWMoM. 2015. 7158207, 2015.
-
(2015)
IEEE WoWMoM
-
-
Schurgot, M.1
Shinberg, D.2
Greenwald, L.3
-
19
-
-
84964688168
-
-
Northsun. net. [Accessed: 26-Jul-2015]
-
Northsun. net, "VPN Configuration HOWTO, " 2015. [Online]. Available: http://www. northsun. net/vpn/. [Accessed: 26-Jul-2015].
-
(2015)
VPN Configuration HOWTO
-
-
-
20
-
-
84964577358
-
-
Jnetpcap. com. [Accessed: 21-Sep-2015
-
Jnetpcap. com, "jNetPcap 1. 4 Overview | jNetPcap OpenSource, " 2015. [Online]. Available: http://jnetpcap. com/?q=jnetpcap-1. 4. [Accessed: 21-Sep-2015.
-
(2015)
JNetPcap 1. 4 Overview | JNetPcap OpenSource
-
-
-
21
-
-
84964688177
-
-
Online Trust Alliance. [Accessed: 28-Oct-2015]
-
Online Trust Alliance, [Online]. Available: https://otalliance. org/initiatives/internet-things. [Accessed: 28-Oct-2015].
-
-
-
-
22
-
-
84964577362
-
-
Online Trust Alliance IoT Trustworthy Working Group. [Accessed: 11-Nov-2015]
-
Online Trust Alliance IoT Trustworthy Working Group, "OTA IoT Trust Framework-Pre-Release Draft 11/11/2015", [Online]. Available: https://otalliance. org/system/files/files/initiative/documents/iot-trust-framework-11-11. pdf. [Accessed: 11-Nov-2015].
-
OTA IoT Trust Framework-Pre-Release Draft 11/11/2015
-
-
|