메뉴 건너뛰기




Volumn 22-23-March-2016, Issue , 2016, Pages

Securing sensor to cloud ecosystem using Internet of Things (IoT) security framework

Author keywords

Framework; Information Security; Internet of Things (IoT); IoT Ecosystem; Security Threats

Indexed keywords

CLOUD COMPUTING; ECOLOGY; ECOSYSTEMS; INTERNET; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84976500178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2896387.2906198     Document Type: Conference Paper
Times cited : (34)

References (12)
  • 1
    • 84976513735 scopus 로고    scopus 로고
    • The internet of things: The possibilities are endless, but how will we get there?
    • 19 June 2014
    • Anderson, C. R. 2014. The internet of Things: The possibilities are endless, but how will we get there?. IDC APeJ Internet of Things Web Conference on 19 June 2014.
    • (2014) IDC APeJ Internet of Things Web Conference On
    • Anderson, C.R.1
  • 7
    • 84976485740 scopus 로고    scopus 로고
    • Hewlett Packard (HP), Internet of Things Research Study. 2015. DOI: http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdf
    • (2015) Internet of Things Research Study
  • 8
    • 85044634138 scopus 로고    scopus 로고
    • Developing the security zone for wireless body area network (WBAN) implementation using practical security assessment (PSA)
    • Rahman A.F.A and Mohamad M. Z. 2015. Developing the Security Zone for Wireless Body Area Network (WBAN) Implementation Using Practical Security Assessment (PSA). Journal of Advance Computer and Network (JACN).
    • (2015) Journal of Advance Computer and Network (JACN)
    • Rahman, A.F.A.1    Mohamad, M.Z.2
  • 9
    • 84976463236 scopus 로고    scopus 로고
    • Open Web Application Security Project (OWASP) IoT Top Ten Vulnerabilities. 2014. DOI https://www.owasp.org/images/7/71/Internet-of-Things-Top-Ten-2014-OWASP.pdf
    • (2014) IoT Top Ten Vulnerabilities
  • 12
    • 84976464477 scopus 로고    scopus 로고
    • Analyses of integrated security framework with embedded RFID system for wireless network architecture
    • 2013
    • Jung T. K. 2013. Analyses of Integrated Security Framework with Embedded RFID System for Wireless Network Architecture. Journal of Convergence Information Technology Vol 8. No. 14 2013.
    • (2013) Journal of Convergence Information Technology , vol.8 , Issue.14
    • Jung, T.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.