메뉴 건너뛰기




Volumn , Issue , 2016, Pages 1015-1021

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; BIG DATA; CALCULATIONS; DATA MINING; EMBEDDED SYSTEMS; SUPPLY CHAINS;

EID: 85008262658     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEC.2016.7743900     Document Type: Conference Paper
Times cited : (122)

References (42)
  • 1
    • 85008250776 scopus 로고    scopus 로고
    • CPNI, Centre of the Protection of National Infrastrucutre. Accessed on 25 Mar
    • Digital built assets and environments. CPNI, Centre of the Protection of National Infrastrucutre, www. cpni. gov. uk/advice/Cross-cuttingadvice/ Digital-built-assets-and-environments. Accessed on 25 Mar 2016.
    • (2016) Digital Built Assets and Environments
  • 4
    • 85008262267 scopus 로고    scopus 로고
    • Accessed on 25 Mar
    • ABIresearch. Connected car cybersecurity. www. abiresearch. com/market-research/product/1017985-connectedcar-cybersecurity. Accessed on 25 Mar 2016.
    • (2016) Connected Car Cybersecurity
  • 5
    • 85099426397 scopus 로고    scopus 로고
    • Detection of ddos attacks via an artificial immune system-inspired multiobjective evolutionary algorithm
    • Cecilia Di Chio et al., editor, Istanbul, Turkey, Apr. Springer-Verlag Berlin Heidelberg
    • U. Akyaz and A. Uyar. Detection of ddos attacks via an artificial immune system-inspired multiobjective evolutionary algorithm. In Cecilia Di Chio et al., editor, EvoApplications 2010, volume Part II of LNCS 6025, pages 1-10, Istanbul, Turkey, Apr. Springer-Verlag Berlin Heidelberg.
    • EvoApplications 2010 Volume Part II of LNCS 6025 , pp. 1-10
    • Akyaz, U.1    Uyar, A.2
  • 6
    • 85008254447 scopus 로고    scopus 로고
    • Seven things to know about the internet of things and industry 4. 0
    • Sept
    • M. Albert. Seven things to know about the internet of things and industry 4. 0. Modern Machine Shop Magazine, 88 (4): 74, Sept 2015.
    • (2015) Modern Machine Shop Magazine , vol.88 , Issue.4 , pp. 74
    • Albert, M.1
  • 7
    • 84856464520 scopus 로고    scopus 로고
    • Evolutionary computation in computer security and forensics: An overview
    • D A. Elizondo et al., editor. Springer-Verlag Berlin Heidelberg
    • S. Al amro, D. A. Elizondo, A. Solanas, and A. Martnez-Ballesté. Evolutionary computation in computer security and forensics: An overview. In D. A. Elizondo et al., editor, Computational Intelligence for Privacy and Security, SCI 394, pages 25-34. Springer-Verlag Berlin Heidelberg, 2012.
    • (2012) Computational Intelligence for Privacy and Security, SCI , vol.394 , pp. 25-34
    • Al Amro, S.1    Elizondo, D.A.2    Solanas, A.3    Martnez-Ballesté, A.4
  • 10
    • 85008256061 scopus 로고    scopus 로고
    • July 2014. Accessed in Jan
    • R. J. Baxter. Bluemix and the internet of things. developer. ibm. com/bluemix/2014/07/16/bluemix-internet-things/, July 2014. Accessed in Jan 2016.
    • (2016) Bluemix and the Internet of Things
    • Baxter, R.J.1
  • 12
    • 85008261649 scopus 로고    scopus 로고
    • CERT-UK, FEb
    • CERT-UK. Cyber-security risks in the supply chain. www. cert. gov. uk/wp-content/uploads/2015/02/Cyber-security-risksin-the-supply-chain. pdf, FEb 2015.
    • (2015) Cyber-security Risks in the Supply Chain
  • 14
    • 36248980117 scopus 로고    scopus 로고
    • Audio-visual multimodal fusion for biometric person authentication and liveness veriftion
    • Australian Computer Society, Inc.
    • G. Chetty and M. Wagner. Audio-visual multimodal fusion for biometric person authentication and liveness veriftion. In Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop, volume 57, pages 17-24. Australian Computer Society, Inc., 2005.
    • (2005) Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop , vol.57 , pp. 17-24
    • Chetty, G.1    Wagner, M.2
  • 15
    • 85008243406 scopus 로고    scopus 로고
    • Audio-visual multimodal fusion for biometric person authentication and liveness veriftion
    • Nov.
    • G. Chetty and M. Wagner. Audio-visual multimodal fusion for biometric person authentication and liveness veriftion. International Journal of Advanced Science and Technology, 48: 23-60, Nov. 2012.
    • (2012) International Journal of Advanced Science and Technology , vol.48 , pp. 23-60
    • Chetty, G.1    Wagner, M.2
  • 19
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (iot): A vision, architectural elements, and future directions
    • 9
    • J. Gubbia, R. Buyyab, S. Marusica, and M. Palaniswamia. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29 (7): 1645-1660, 9 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbia, J.1    Buyyab, R.2    Marusica, S.3    Palaniswamia, M.4
  • 22
    • 84955449565 scopus 로고    scopus 로고
    • Recommendations for implementing the strategic initiative industrie 4. 0: Securing the future of German manufacturing industry, final report of the industrie 4. 0 working group
    • Apr
    • H. Kagermann, J. Helbig, A. Hellinger, and W. Wahlster. Recommendations for implementing the strategic initiative industrie 4. 0: Securing the future of german manufacturing industry, final report of the industrie 4. 0 working group. Forschungsunion, Apr 2013.
    • (2013) Forschungsunion
    • Kagermann, H.1    Helbig, J.2    Hellinger, A.3    Wahlster, W.4
  • 23
    • 85008254336 scopus 로고    scopus 로고
    • Develops world's first authentication technology to extract and match 2, 048-bit feature codes from palm vein images
    • accessed in Jan, Aug. 2013
    • Kawasaki. Fujitsu develops world's first authentication technology to extract and match 2, 048-bit feature codes from palm vein images. Fujitsu Laboratories Ltd, Aug. 2013. accessed in Jan 2016.
    • (2016) Fujitsu Laboratories Ltd
    • Fujitsu, K.1
  • 26
    • 85008259107 scopus 로고    scopus 로고
    • Sept 2012. Accessed in Jan
    • M. J. Koster. Data models for the internet of things. iotdatamodels. blogspot. co. uk/2012/09/data-models-for-internet-of-things-5. html, Sept 2012. Accessed in Jan 2016.
    • (2016) Data Models for the Internet of Things
    • Koster, M.J.1
  • 28
    • 85008253255 scopus 로고    scopus 로고
    • Ics defense use case (duc): German steel mill cyber attack
    • R. M. Lee, M. J. Assante, and T. Conway. Ics defense use case (duc): German steel mill cyber attack. Report, SANS, DEC 2014.
    • (2014) Report, SANS, DEC
    • Lee, R.M.1    Assante, M.J.2    Conway, T.3
  • 30
    • 84879391983 scopus 로고    scopus 로고
    • Material selection using an interval 2-tuple linguistic vikor method considering subjective and objective weights
    • H.-C. Liu, L. Liu, and J. Wu. Material selection using an interval 2-tuple linguistic vikor method considering subjective and objective weights. Materials and Design, 52: 158-167, 2013.
    • (2013) Materials and Design , vol.52 , pp. 158-167
    • Liu, H.-C.1    Liu, L.2    Wu, J.3
  • 34
    • 85008244614 scopus 로고    scopus 로고
    • NCCIC, Sept 2014. Accessed in Jan
    • NCCIC. Incident response / vulnerability coordination in 2014. ics-cert. us-cert. gov/sites/default/files/Monitors/ICSCERT Monitor Sep2014-Feb2015. pdf, Sept 2014. Accessed in Jan 2016.
    • (2016) Incident Response / Vulnerability Coordination in 2014
  • 35
    • 85008244606 scopus 로고    scopus 로고
    • accessed in Jan
    • Protiviti. Intelligent computation. www. protiviti. co. uk/en-US/Documents/POV/POV-Privacy-and-Data-Protection-Protiviti. pdf. accessed in Jan 2016.
    • (2016) Intelligent Computation
  • 38
    • 84982835293 scopus 로고    scopus 로고
    • Optimization of tls security protocol using the adaptable security model
    • Jan
    • P. Sza?achowski, B. Ksie? ?zopolski, and Z. Kotulski. Optimization of tls security protocol using the adaptable security model. Annales UMCS, Informatica, 9 (1): 59-75, Jan 2009.
    • (2009) Annales UMCS, Informatica , vol.9 , Issue.1 , pp. 59-75
    • Szaachowski, P.1    Ksie Zopolski, B.2    Kotulski, Z.3
  • 40
    • 24344492944 scopus 로고    scopus 로고
    • Machine learning techniques in spam filtering
    • May
    • K. Tretyakov. Machine learning techniques in spam filtering. In Data Mining Problem-oriented Seminar, MTAT. 03. 177, pages 60-79, May 2004.
    • (2004) Data Mining Problem-oriented Seminar, MTAT. , vol.3 , Issue.177 , pp. 60-79
    • Tretyakov, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.