-
2
-
-
27744595750
-
Toward a smart grid: Power delivery for the 21st century
-
M. Amin and W. Bruce, "Toward a smart grid: power delivery for the 21st century, " IEEE Power and energy Magazine, vol. 3, no. 5, pp. 34-41, 2005.
-
(2005)
IEEE Power and Energy Magazine
, vol.3
, Issue.5
, pp. 34-41
-
-
Amin, M.1
Bruce, W.2
-
5
-
-
85027258733
-
-
"Your hackable house." [Online]. Available: http://money.cnn.com/interactive/technology/hackable-house/
-
Your Hackable House
-
-
-
8
-
-
84878618952
-
The essence of future smart houses: From embedding ict to adapting to sustainability principles
-
A. GhaffarianHoseini et al., "The essence of future smart houses: From embedding ict to adapting to sustainability principles, " Renewable and Sustainable Energy Reviews, vol. 24, no. 1, pp. 593-607, 2013.
-
(2013)
Renewable and Sustainable Energy Reviews
, vol.24
, Issue.1
, pp. 593-607
-
-
Ghaffarian Hoseini, A.1
-
9
-
-
84995633348
-
Smart transportation networks drive gains
-
S. Greengard, "Smart transportation networks drive gains, " Communications of the ACM, vol. 58, no. 1, pp. 25-27, 2015.
-
(2015)
Communications of the ACM
, vol.58
, Issue.1
, pp. 25-27
-
-
Greengard, S.1
-
10
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
J. Gubbi et al., "Internet of things (iot): A vision, architectural elements, and future directions, " Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
-
11
-
-
83555176391
-
Security challenges in the IP-based internet of things
-
T. Heer et al., "Security challenges in the ip-based internet of things, " Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
-
12
-
-
84973325088
-
Towards an analysis of security issues, challenges, and open problems in the internet of things
-
June 2015
-
M. Hossain, M. Fotouhi, and R. Hasan, "Towards an analysis of security issues, challenges, and open problems in the internet of things, " in Proceedings of the 2015 IEEE World Congress on Services, June 2015.
-
Proceedings of the 2015 IEEE World Congress on Services
-
-
Hossain, M.1
Fotouhi, M.2
Hasan, R.3
-
14
-
-
84910149653
-
Security of the internet of things: Perspectives and challenges
-
Q. Jing et al., "Security of the internet of things: Perspectives and challenges, " Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014.
-
(2014)
Wireless Networks
, vol.20
, Issue.8
, pp. 2481-2501
-
-
Jing, Q.1
-
16
-
-
77956877124
-
The internet of things: A survey
-
A. L. L. Atzori and G. Morabito, "The internet of things: A survey, " Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, A.L.L.1
Morabito, G.2
-
17
-
-
84887997518
-
Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach
-
C. Lin and G. Wu, "Enhancing the attacking efficiency of the node capture attack in wsn: A matrix approach, " The Journal of Supercomputing, vol. 66, no. 2, pp. 989-1007, 2013.
-
(2013)
The Journal of Supercomputing
, vol.66
, Issue.2
, pp. 989-1007
-
-
Lin, C.1
Wu, G.2
-
18
-
-
84872015191
-
Byod security challenges: Control and protect your most sensitive data
-
B. Morrow, "Byod security challenges: control and protect your most sensitive data, " Network Security, vol. 2012, no. 12, pp. 5-8, 2012.
-
(2012)
Network Security
, vol.2012
, Issue.12
, pp. 5-8
-
-
Morrow, B.1
-
19
-
-
84879082499
-
Trace analysis and mining for smart cities: Issues, methods, and applications
-
G. Pan et al., "Trace analysis and mining for smart cities: issues, methods, and applications, " IEEE Communications Magazine, vol. 121, no. 6, pp. 120-126, 2015.
-
(2015)
IEEE Communications Magazine
, vol.121
, Issue.6
, pp. 120-126
-
-
Pan, G.1
-
20
-
-
84885328301
-
Svelte: Real-Time intrusion detection in the internet of things
-
S. Raza, L. Wallgren, and T. Voigt, "Svelte: Real-Time intrusion detection in the internet of things, " Ad Hoc Networks, vol. 11, no. 8, pp. 2661-2674, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
21
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
22
-
-
85037101633
-
A secure and efficient framework to read isolated smart grid devices
-
K. Sha, N. Alatrash, and Z. Wang, "A secure and efficient framework to read isolated smart grid devices, " IEEE Transactions on Smart Grid, vol. pp, no. 99, pp. 1-13, 2016.
-
(2016)
IEEE Transactions on Smart Grid
, Issue.99
, pp. 1-13
-
-
Sha, K.1
Alatrash, N.2
Wang, Z.3
-
23
-
-
84969922595
-
The promise of edge computing
-
W. Shi and S. Dustdar, "The promise of edge computing, " IEEE Computer Magazine, vol. 29, no. 5, pp. 78-81, 2016.
-
(2016)
IEEE Computer Magazine
, vol.29
, Issue.5
, pp. 78-81
-
-
Shi, W.1
Dustdar, S.2
-
25
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A model for protecting privacy, " International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledgebased Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
26
-
-
85043706761
-
The magic of RFID
-
Oct
-
R. Wang, "The magic of RFID, " ACM Queue, vol. 2, no. 7, pp. 41-48, Oct. 2004.
-
(2004)
ACM Queue
, vol.2
, Issue.7
, pp. 41-48
-
-
Wang, R.1
|