메뉴 건너뛰기




Volumn 6, Issue 4, 2017, Pages 24-27

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 85031103873     PISSN: 21622248     EISSN: 21622256     Source Type: Trade Journal    
DOI: 10.1109/MCE.2017.2714744     Document Type: Article
Times cited : (58)

References (15)
  • 1
    • 84983385301 scopus 로고    scopus 로고
    • Everything you wanted to know about smart cities
    • July
    • S. P. Mohanty, U. Choppali, and E. Kougianos, "Everything you wanted to know about smart cities," IEEE Consum. Electron. Mag., vol. 6, no. 3, pp. 60-70, July 2016.
    • (2016) IEEE Consum. Electron. Mag. , vol.6 , Issue.3 , pp. 60-70
    • Mohanty, S.P.1    Choppali, U.2    Kougianos, E.3
  • 2
    • 84964682662 scopus 로고    scopus 로고
    • Wireless sensor network simulation frameworks: A tutorial review
    • Apr.
    • M. L. Rajaram, E. Kougianos, S. P. Mohanty, and U. Choppali, "Wireless sensor network simulation frameworks: A tutorial review," IEEE Consum. Electron. Mag., vol. 6, no. 2, pp. 63-69, Apr. 2016.
    • (2016) IEEE Consum. Electron. Mag. , vol.6 , Issue.2 , pp. 63-69
    • Rajaram, M.L.1    Kougianos, E.2    Mohanty, S.P.3    Choppali, U.4
  • 3
    • 85031094841 scopus 로고    scopus 로고
    • Rendezvous based routing protocol for wireless sensor networks with mobile sink
    • S. Sharma, D. Puthal, S. Jena, A. Zomaya, and R. Ranjan, "Rendezvous based routing protocol for wireless sensor networks with mobile sink," J. Supercomputing, vol. 73, no. 3, pp. 1168-1188, 2017.
    • (2017) J. Supercomputing , vol.73 , Issue.3 , pp. 1168-1188
    • Sharma, S.1    Puthal, D.2    Jena, S.3    Zomaya, A.4    Ranjan, R.5
  • 4
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of things-A comparison of link-layer security and IPsec for 6LoWPAN
    • S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of things-A comparison of link-layer security and IPsec for 6LoWPAN," Security Commun. Networks, vol. 7, no. 12, pp. 2654-2668, 2014.
    • (2014) Security Commun. Networks , vol.7 , Issue.12 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Höglund, J.3    Roedig, U.4    Voigt, T.5
  • 5
    • 84874116437 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA). [Online]. Available: https://cloudsecurityalliance.org/group/software-defined-perimeter
    • Cloud Security Alliance (CSA)
  • 7
    • 85008884270 scopus 로고    scopus 로고
    • DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream," ACM Trans. Embedded Comput. Syst., vol. 16, no. 2, p. 51, 2017.
    • (2017) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.2 , pp. 51
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 8
    • 85092001362 scopus 로고    scopus 로고
    • SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
    • D. Puthal, X. Wu, S. Nepal, R. Ranjan, and J. Chen, "SEEN: A selective encryption method to ensure confidentiality for big sensing data streams," IEEE Trans. Big Data, 2017. doi: 10.1109/TBDATA.2017.2702172.
    • (2017) IEEE Trans. Big Data
    • Puthal, D.1    Wu, X.2    Nepal, S.3    Ranjan, R.4    Chen, J.5
  • 10
    • 84978224275 scopus 로고    scopus 로고
    • Threats to networking cloud and edge datacenters in the Internet of things
    • D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "Threats to networking cloud and edge datacenters in the Internet of things," IEEE Cloud Comput., vol. 3, no. 3, pp. 64-71, 2016.
    • (2016) IEEE Cloud Comput. , vol.3 , Issue.3 , pp. 64-71
    • Puthal, D.1    Nepal, S.2    Ranjan, R.3    Chen, J.4
  • 12
    • 84991278236 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST RFI 130208119-3119-01, submitted, 4 Aug
    • National Institute of Standards and Technology, "Developing a framework to improve critical infrastructure cybersecurity," NIST RFI 130208119-3119-01, submitted 4 Aug. 2013.
    • (2013) Developing A Framework to Improve Critical Infrastructure Cybersecurity
  • 13
    • 85031090685 scopus 로고    scopus 로고
    • Jericho Forum., May. 15
    • Jericho Forum. (2017, May 15). De-perimeterization. [Online]. Available: https://collabo ration.opengroup.org/jericho/presentations .htm
    • (2017) De-perimeterization
  • 14
    • 85031091706 scopus 로고    scopus 로고
    • Vidder, Software Defined Perimeter 2016. [Online]. Available: www.vidder.com/why-vid der/software-defined-perimeter.html
    • (2016) Vidder, Software Defined Perimeter


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.