-
2
-
-
84908397157
-
Internet of Things for Smart Cities
-
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M. Internet of Things for Smart Cities. IEEE IoT Journal. 2014;1(1):22-32.
-
(2014)
IEEE IoT Journal
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.3
Vangelista, L.4
Zorzi, M.5
-
5
-
-
85045079443
-
-
Accessed April
-
Legezo D. How to trick traffic sensors. Kaspersky Lab. https://securelist.com/blog/research/74454/how-to-trick-traffic-sensors/. Accessed April 2016.
-
(2016)
How to trick traffic sensors
-
-
Legezo, D.1
-
6
-
-
41249100291
-
A survey of security in telemedicine with wireless sensor networks
-
In, Xiao Y, Chen H, eds., Boca Raton, Florida, United States, CRC Press
-
Takahashi D, Xiao Y, Hu F. A survey of security in telemedicine with wireless sensor networks. In: Xiao Y, Chen H, eds. Mobile Telemedicine: A Computing and Networking Perspective. Boca Raton, Florida, United States: CRC Press; 2008:209-235.
-
(2008)
Mobile Telemedicine: A Computing and Networking Perspective
, pp. 209-235
-
-
Takahashi, D.1
Xiao, Y.2
Hu, F.3
-
7
-
-
84864795204
-
Multi-agent control system with information fusion based comfort model for smart buildings
-
Wang Z, Wang L, Dounis A, Yang R. Multi-agent control system with information fusion based comfort model for smart buildings. Appl Energy. 2012;99:247-254.
-
(2012)
Appl Energy
, vol.99
, pp. 247-254
-
-
Wang, Z.1
Wang, L.2
Dounis, A.3
Yang, R.4
-
8
-
-
85011103421
-
-
? Paper presented at IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W);, Augsburg, Germany
-
Mehta A, Tärneberg W, Klein C, Tordsson J, Kihl M, Elmroth E. How beneficial are intermediate layer data centers in mobile edge networks? Paper presented at: IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; Augsburg, Germany.
-
(2016)
How beneficial are intermediate layer data centers in mobile edge networks
-
-
Mehta, A.1
Tärneberg, W.2
Klein, C.3
Tordsson, J.4
Kihl, M.5
Elmroth, E.6
-
10
-
-
85011048660
-
Application orchestration in mobile edge cloud: Placing of IoT applications to the edge
-
Augsburg, Germany
-
Hegyi A, Flinck H, Ketyko I, Kuure P, Nemes C, Pinter L. Application orchestration in mobile edge cloud: Placing of IoT applications to the edge. Paper presented at: IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; Augsburg, Germany.
-
(2016)
IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W)
-
-
Hegyi, A.1
Flinck, H.2
Ketyko, I.3
Kuure, P.4
Nemes, C.5
Pinter, L.6
-
15
-
-
84861076200
-
Security architecture and key technologies for IoT/CPS
-
Ding C, Yang LJ, Wu M. Security architecture and key technologies for IoT/CPS. ZTE Technology Journal. 2011;17(1):11-16.
-
(2011)
ZTE Technology Journal
, vol.17
, Issue.1
, pp. 11-16
-
-
Ding, C.1
Yang, L.J.2
Wu, M.3
-
18
-
-
84861136278
-
Automated security test generation with formal threat models
-
Xu D, Tu M, Sanford M, Thomas L, Woodraska D, Xu W. Automated security test generation with formal threat models. IEEE Trans Dependable Secure Comput. 2012;9(4):526-540.
-
(2012)
IEEE Trans Dependable Secure Comput
, vol.9
, Issue.4
, pp. 526-540
-
-
Xu, D.1
Tu, M.2
Sanford, M.3
Thomas, L.4
Woodraska, D.5
Xu, W.6
-
20
-
-
84906841638
-
An information framework for creating a smart city through internet of things
-
Jin J, Gubbi J, Marusic S, Palaniswami M. An information framework for creating a smart city through internet of things. IEEE Internet of Things J. 2014;1(2):112-121.
-
(2014)
IEEE Internet of Things J
, vol.1
, Issue.2
, pp. 112-121
-
-
Jin, J.1
Gubbi, J.2
Marusic, S.3
Palaniswami, M.4
-
21
-
-
84891676331
-
IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and Arduino
-
Lyon, France
-
Ferreira HGC, Canedo ED, de Sousa Junior RT. IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and Arduino. Paper presented at: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob); 2013; Lyon, France.
-
(2013)
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
-
-
Ferreira, H.G.C.1
Canedo, E.D.2
de Sousa Junior, R.T.3
-
22
-
-
84899716181
-
Smart home: Integrating Internet of Things with web services and cloud computing
-
Bristol, United Kingdom
-
Soliman M, Abiodun T, Hamouda T, Zhou1 J, Lung C. Smart home: Integrating Internet of Things with web services and cloud computing. Paper presented at: IEEE 5th International Conference on Cloud Computing Technology and Science; 2013; Bristol, United Kingdom.
-
(2013)
IEEE 5th International Conference on Cloud Computing Technology and Science
-
-
Soliman, M.1
Abiodun, T.2
Hamouda, T.3
Zhoul, J.4
Lung, C.5
-
24
-
-
84973325088
-
Towards an analysis of security issues, challenges, and open problems in the Internet of Things
-
New York, USA
-
Hossain M, Fotouhi M, Hasan R. Towards an analysis of security issues, challenges, and open problems in the Internet of Things. Paper presented at: IEEE World Congress on Services; 2015; New York, USA.
-
(2015)
IEEE World Congress on Services
-
-
Hossain, M.1
Fotouhi, M.2
Hasan, R.3
-
26
-
-
84896319063
-
Network attacks: taxonomy, tools and systems
-
Hoque N, Bhuyan M, Charan Baishya R, Bhattacharyya DK, Kalita JK. Network attacks: taxonomy, tools and systems. J Netw Comput Appl. 2014;40:307-324.
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 307-324
-
-
Hoque, N.1
Bhuyan, M.2
Charan Baishya, R.3
Bhattacharyya, D.K.4
Kalita, J.K.5
-
27
-
-
85035359173
-
-
Birmingham, UK, Packt Publishing Ltd
-
Mishra C. Mastering Wireshark. Birmingham, UK: Packt Publishing Ltd; 2016.
-
(2016)
Mastering Wireshark
-
-
Mishra, C.1
-
28
-
-
0003456805
-
-
Third Edition The Sparse Way, 3rd ed, Amsterdam, Netherlands, Academic Press
-
Mallat S. A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way. 3rd ed. Amsterdam, Netherlands: Academic Press; 2008.
-
(2008)
A Wavelet Tour of Signal Processing
-
-
Mallat, S.1
-
30
-
-
85045109065
-
-
Accessed June 2016.
-
Weka. http://weka.sourceforge.net/doc.dev/weka/classifiers/rules/JRip.html. Accessed June 2016.
-
-
-
-
33
-
-
84992036644
-
Detection of replay attacks in cyber-physical systems
-
Boston, MA
-
Hoehn A, Zhang P. Detection of replay attacks in cyber-physical systems. Paper presented at: American Control Conference (ACC); 2016; Boston, MA.
-
(2016)
American Control Conference (ACC)
-
-
Hoehn, A.1
Zhang, P.2
-
34
-
-
84902297134
-
Toward a secure wireless-based home area network for metering in smart grids
-
Namboodiri V, Aravinthan V, Mohapatra S, Karimi B, Jewell W. Toward a secure wireless-based home area network for metering in smart grids. IEEE Syst J. 2013;8(2):1-12. https://doi.org/10.1109/JSYST.2013.2260700
-
(2013)
IEEE Syst J
, vol.8
, Issue.2
, pp. 1-12
-
-
Namboodiri, V.1
Aravinthan, V.2
Mohapatra, S.3
Karimi, B.4
Jewell, W.5
-
35
-
-
84893330451
-
A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks
-
Philadelphia, Pennsylvania, USA
-
Tanabe N, Kohno E, Kakuda Y. A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks. Paper presented at: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops; July 8, 2013; Philadelphia, Pennsylvania, USA.
-
(2013)
2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops
-
-
Tanabe, N.1
Kohno, E.2
Kakuda, Y.3
-
36
-
-
84945392187
-
Detecting malicious data injections in wireless sensor networks: a survey
-
Article 24.
-
Illiano VP, Lupu E. Detecting malicious data injections in wireless sensor networks: a survey. ACM Comput Surv (CSUR). 2015;48(2): Article No. 24.
-
(2015)
ACM Comput Surv (CSUR)
, vol.48
, Issue.2
-
-
Illiano, V.P.1
Lupu, E.2
-
37
-
-
84958760322
-
The SDN shuffle: creating a moving-target defense using host-based software-defined networking
-
Denver, Colorado, USA
-
Mac Farland DC, Shue CA. The SDN shuffle: creating a moving-target defense using host-based software-defined networking. Paper presented at: Proceedings of the Second ACM Workshop on Moving Target Defense; October 12, 2015; Denver, Colorado, USA.
-
(2015)
Proceedings of the Second ACM Workshop on Moving Target Defense
-
-
Mac Farland, D.C.1
Shue, C.A.2
|