-
6
-
-
84857249882
-
The reinforcement of communication security of the internet of things in the field of intelligent home through the use of middleware
-
Li You-guo, Jiang Ming-fu."The Reinforcement of Communication Security of the Internet of Things in the Field of Intelligent Home Through the Use Of Middleware", Fourth International Symposium on Knowledge Acquisition and Modeling (KAM), pp. 254-257 2011
-
(2011)
Fourth International Symposium on Knowledge Acquisition and Modeling (KAM
, pp. 254-257
-
-
You-Guo, L.1
Ming-Fu, J.2
-
8
-
-
84876156481
-
-
April
-
Huansheng Ning and Hong Liu, Laurence T. Yang, " Cyberentity Security in the Internet of Things", vol. 46, no. 4, pp. 46-53,. April 2013
-
(2013)
Cyberentity Security in the Internet of Things
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
10
-
-
77955298774
-
The internet of things for ambient assisted living
-
A. Dohr, R. Modre-Osprian, M. Drobics, D. Hayn, G.Schreier, "The Internet of Things for Ambient Assisted Living", Seventh International Conference on Information Technology, pp. 804-809, 2010
-
(2010)
Seventh International Conference on Information Technology
, pp. 804-809
-
-
Dohr, A.1
Modre-Osprian, R.2
Drobics, M.3
Hayn, D.4
Schreier, G.5
-
12
-
-
84855934497
-
Security metrics for e-healthcare information systems: A domain specific metrics approach
-
Jafari, S., Mtenzi, F., Fitzpatrick, R., and O'Shea, B., Security metrics for e-healthcare information systems: A domain specific metrics approach", Int. Journal of Digital Society, Vol. 1, No.4, pp. 238-245, 2010.
-
(2010)
Int. Journal of Digital Society
, vol.1
, Issue.4
, pp. 238-245
-
-
Jafari, S.1
Mtenzi, F.2
Fitzpatrick, R.3
O'Shea, B.4
-
13
-
-
45749136672
-
A comprehensive and comparative metric for information security
-
Weiß, S., Weissmann, O., and Dressler, F., "A comprehensive and comparative metric for information security", In Proceedings of IFIP International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM'05), pp. 1-10, 2005.
-
(2005)
Proceedings of IFIP International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM'05
, pp. 1-10
-
-
Weiß, S.1
Weissmann, O.2
Dressler, F.3
-
14
-
-
70350787080
-
Self-Managed Security Cell, a security model for the Internet of Things and Services
-
Pierre de Leusse., Panos Periorellis., Theo Dimitrakos., and Srijith K., Nair., "Self-Managed Security Cell, a security model for the Internet of Things and Services", First International Conference on Advances in Future Internet, pp. 47-52, 2009.
-
(2009)
First International Conference on Advances in Future Internet
, pp. 47-52
-
-
De Leusse, P.1
Panos, P.2
Theo, D.3
Srijith, K.N.4
-
16
-
-
84885207675
-
Towards metrics-driven adaptive security management in e-health iot applications
-
Reijo, M, Savola., Habtamu, Abie., Markus Sihvonen., "Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications". Proceedings of the 7th International Conference on Body Area Networks, pp. 276-281, 2012.
-
(2012)
Proceedings of the 7th International Conference on Body Area Networks
, pp. 276-281
-
-
Reijo, M.1
Savola, H.2
Abie, S.M.3
-
17
-
-
84861019658
-
Security in the internet of things-a review
-
Hi Suo, Jiafu, Caifeng Zoua, Jianqi Liua Wan. "Security in the Internet of Things-A Review", International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 648-651, 2012.
-
(2012)
International Conference on Computer Science and Electronics Engineering (ICCSEE
, pp. 648-651
-
-
Suo, H.1
Jiafu, Z.C.2
Liua Wan, J.3
-
19
-
-
84889007545
-
Hardware and embedded security in the context of internet of things
-
Arun Kanuparthi, Ramesh Karri, Sateesh Addepalli. Hardware and Embedded Security in the Context of Internet of Things. Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles, pp. 61-64, 2013
-
(2013)
Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles
, pp. 61-64
-
-
Kanuparthi, A.1
Karri, R.2
Addepalli, S.3
-
20
-
-
77956877124
-
The internet of things: A survey
-
Atzoria, L., Ierab, A., and Morabito, G. 2010. "The Internet of Things: A survey", Computer Networks, vol. 54, no. 15, pp. 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzoria, L.1
Ierab, A.2
Morabito, G.3
-
22
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. Internet of things: Vision, applications and research challenges", Ad Hoc Networks, 10(7), 1497-1516, 2012.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
24
-
-
9144237639
-
An adaptive and predictive security model for mobile ad hoc Networks
-
S. P. Alampalayam and A. Kumar, "An adaptive and predictive security model for mobile ad hoc Networks", Springer Wireless Personal Communications 29 (3-4), pp. 263-281, 2004
-
(2004)
Springer Wireless Personal Communications
, vol.29
, Issue.3-4
, pp. 263-281
-
-
Alampalayam, S.P.1
Kumar, A.2
-
25
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
-
M. Turkanovic, B. Brumen, M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion, Ad Hoc Networks 20:96-112, 2014
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Hölbl, M.3
-
30
-
-
84880413059
-
Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
-
Simone Cirani, Gianluigi Ferrari, and Luca Veltri, "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview", Algorithms 2013, 6, 197-226
-
(2013)
Algorithms
, vol.6
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
31
-
-
84984856519
-
A survey: Ddos attack on internet of things
-
K.Sonar and H. Upadhyay, "A Survey: DDOS Attack on Internet of Things", Intl. Journal of Engineering Research and Development, vol. 10, no. 11, pp. 58-63
-
Intl. Journal of Engineering Research and Development
, vol.10
, Issue.11
, pp. 58-63
-
-
Sonar, K.1
Upadhyay, H.2
-
32
-
-
84888580916
-
Cyber security issues imposed on nuclear power plants
-
Do-Yeon Kim, "Cyber security issues imposed on nuclear power plants", Annals of Nuclear Energy, Volume 65, 2014, pp. 141-143, 2014
-
(2014)
Annals of Nuclear Energy
, vol.65
, Issue.2014
, pp. 141-143
-
-
Kim, D.1
-
33
-
-
84975490880
-
-
HP Whitepaper retrieved in Aug
-
HP Whitepaper retrieved in Aug 2015 http://go.saas.hp.com/fod/internet-of-things
-
(2015)
-
-
-
34
-
-
84876109205
-
Stuxnet: What has changed
-
D. E. Denning, "Stuxnet: What Has Changed", Future Internet, vol.4 pp. 672-687, 2012
-
(2012)
Future Internet
, vol.4
, pp. 672-687
-
-
Denning, D.E.1
-
35
-
-
84857170643
-
Srinivasan Statistical based intrusion detection framework using six sigma techniques
-
SAP Kumar, A Kumar, S Srinivasan Statistical based intrusion detection framework using six sigma techniques, IJCSNS 7 (10), 333, 2007
-
(2007)
IJCSNS
, vol.7
, Issue.10
, pp. 333
-
-
Kumar, S.1
Kumar S, A.2
-
36
-
-
84975509828
-
-
Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks, SP Alampalayam, S Srinivasan
-
Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks, SP Alampalayam, S Srinivasan The International Journal of Computer Science and Network Security 9 (9), 1-1, 2009
-
(2009)
The International Journal of Computer Science and Network Security
, vol.9
, Issue.9
, pp. 1
-
-
-
37
-
-
84975487112
-
-
Control Framework for Secure Cloud Computing H Srivastava, SA Kumar
-
Control Framework for Secure Cloud Computing H Srivastava, SA Kumar Journal of Information Security 6 (01), 12, 2014
-
(2014)
Journal of Information Security
, vol.6
, Issue.1
, pp. 12
-
-
|