-
1
-
-
84922147049
-
-
(Springer Briefs in Electrical and Computer Engineering). Heidelberg, Germany: Springer
-
S. Karnouskos, P. J. Marrón, G. Fortino, L. Mottola, and J. R. Martínez-de Dios, Applications and Markets for Cooperating Objects (Springer Briefs in Electrical and Computer Engineering). Heidelberg, Germany: Springer, 2014, pp. 1-120.
-
(2014)
Applications and Markets for Cooperating Objects
, pp. 1-120
-
-
Karnouskos, S.1
Marrón, P.J.2
Fortino, G.3
Mottola, L.4
Martínez-De-Dios, J.R.5
-
2
-
-
85052721512
-
-
Cham, Switzerland: Springer
-
G. Fortino and P. Trunfio, Internet of Things Based on Smart Objects, Technology, Middleware and Applications. Cham, Switzerland: Springer, 2014.
-
(2014)
Internet of Things Based on Smart Objects, Technology, Middleware and Applications
-
-
Fortino, G.1
Trunfio, P.2
-
3
-
-
84949490827
-
Guarantor and reputation based trust model for social internet of things
-
Dubrovnik, Croatia
-
H. Xiao, N. Sidhu, and B. Christianson, "Guarantor and reputation based trust model for social Internet of Things," in Proc. Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), Dubrovnik, Croatia, 2015, pp. 600-605.
-
(2015)
Proc. Int. Wireless Commun. Mobile Comput. Conf. (IWCMC)
, pp. 600-605
-
-
Xiao, H.1
Sidhu, N.2
Christianson, B.3
-
4
-
-
85053192264
-
-
Accessed: Oct. [Online]
-
Inter-IoT Project. Accessed: Oct. 2017. [Online]. Available: http://www.inter-iot-project.eu/
-
(2017)
Inter-IoT Project
-
-
-
5
-
-
85045689875
-
-
[Online]
-
Wikipedia Contributors. (2016). Dyn Cyberattack. [Online]. Available: https://en.wikipedia.org/w/index.php?title=2016-Dyn-cyberattack& oldid=763071700
-
(2016)
Dyn Cyberattack
-
-
-
6
-
-
85024492878
-
IoT goes nuclear: Creating a zigbee chain reaction
-
San Jose, CA, USA
-
E. Ronen, A. Shamir, A.-O. Weingarten, and C. O'Flynn, "IoT goes nuclear: Creating a ZigBee chain reaction," in Proc. IEEE Symp. Security Privacy (SP), San Jose, CA, USA, 2017, pp. 195-212.
-
(2017)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 195-212
-
-
Ronen, E.1
Shamir, A.2
Weingarten, A.-O.3
O'Flynn, C.4
-
7
-
-
84910149653
-
Security of the internet of things: Perspectives and challenges
-
Nov
-
Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: Perspectives and challenges," Wireless Netw., vol. 20, no. 8, pp. 2481-2501, Nov. 2014.
-
(2014)
Wireless Netw.
, vol.20
, Issue.8
, pp. 2481-2501
-
-
Jing, Q.1
Vasilakos, A.V.2
Wan, J.3
Lu, J.4
Qiu, D.5
-
8
-
-
84979493158
-
Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings
-
Jul.
-
K. Lin, M. Chen, J. Deng, M. M. Hassan, and G. Fortino, "Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings," IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1294-1307, Jul. 2016.
-
(2016)
IEEE Trans. Autom. Sci. Eng.
, vol.13
, Issue.3
, pp. 1294-1307
-
-
Lin, K.1
Chen, M.2
Deng, J.3
Hassan, M.M.4
Fortino, G.5
-
9
-
-
85010333007
-
Security issues in wireless networks: An overview
-
Sarajevo, Bosnia and Herzegovina
-
S. Baraković et al., "Security issues in wireless networks: An overview," in Proc. XI Int. Symp. Telecommun. (BIHTEL), Sarajevo, Bosnia and Herzegovina, 2016, pp. 1-6.
-
(2016)
Proc. XI Int. Symp. Telecommun. (BIHTEL)
, pp. 1-6
-
-
Baraković, S.1
-
10
-
-
85017187030
-
Using centrality measures to predict helpfulness-based reputation in trust networks
-
P. De Meo, K. Musial-Gabrys, D. Rosaci, G. M. L. Sarnè, and L. Aroyo, "Using centrality measures to predict helpfulness-based reputation in trust networks," ACM Trans. Internet Technol., vol. 17, no. 1, pp. 1-20, 2017.
-
(2017)
ACM Trans. Internet Technol.
, vol.17
, Issue.1
, pp. 1-20
-
-
De Meo, P.1
Musial-Gabrys, K.2
Rosaci, D.3
Sarnè, G.M.L.4
Aroyo, L.5
-
11
-
-
84949951775
-
Health information seeking in the web 2.0 age: Trust in social media, uncertainty reduction, and self-disclosure
-
Mar.
-
W.-Y. Lin, X. Zhang, H. Song, and K. Omori, "Health information seeking in the Web 2.0 age: Trust in social media, uncertainty reduction, and self-disclosure," Comput. Human Behav., vol. 56, pp. 289-294, Mar. 2016.
-
(2016)
Comput. Human Behav.
, vol.56
, pp. 289-294
-
-
Lin, W.-Y.1
Zhang, X.2
Song, H.3
Omori, K.4
-
12
-
-
84976443459
-
Trust estimation of the semantic web using semantic web clustering
-
H. Shirgahi, M. Mohsenzadeh, and H. H. S. Javadi, "Trust estimation of the semantic Web using semantic Web clustering," J. Exp. Theor. Artif. Intell., vol. 29, no. 3, pp. 537-556, 2017.
-
(2017)
J. Exp. Theor. Artif. Intell.
, vol.29
, Issue.3
, pp. 537-556
-
-
Shirgahi, H.1
Mohsenzadeh, M.2
Javadi, H.H.S.3
-
13
-
-
85053191341
-
Online shoppers' satisfaction: The impact of shopping values, website factors and trust
-
T. S. Vijay, S. Prashar, and C. Parsad, "Online shoppers' satisfaction: The impact of shopping values, website factors and trust," Int. J. Strategic Decis. Sci., vol. 8, no. 2, pp. 52-69, 2017.
-
(2017)
Int. J. Strategic Decis. Sci.
, vol.8
, Issue.2
, pp. 52-69
-
-
Vijay, T.S.1
Prashar, S.2
Parsad, C.3
-
14
-
-
85012295286
-
IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices
-
Jan./Feb.
-
S. Pinto, T. Gomes, J. Pereira, J. Cabral, and A. Tavares, "IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices," IEEE Internet Comput., vol. 21, no. 1, pp. 40-47, Jan./Feb. 2017.
-
(2017)
IEEE Internet Comput.
, vol.21
, Issue.1
, pp. 40-47
-
-
Pinto, S.1
Gomes, T.2
Pereira, J.3
Cabral, J.4
Tavares, A.5
-
15
-
-
84863512174
-
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
-
Jul.
-
D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, "ReTrust: Attack-resistant and lightweight trust management for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, Issue.4
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.V.5
-
16
-
-
84901427258
-
A survey on trust management for internet of things
-
Jun.
-
Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," J. Netw. Comput. Appl., vol. 42, pp. 120-134, Jun. 2014.
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
17
-
-
84902106352
-
Trust management mechanism for internet of things
-
Feb.
-
G. Lize, W. Jingpei, and S. Bin, "Trust management mechanism for Internet of Things," China Commun., vol. 11, no. 2, pp. 148-156, Feb. 2014.
-
(2014)
China Commun.
, vol.11
, Issue.2
, pp. 148-156
-
-
Lize, G.1
Jingpei, W.2
Bin, S.3
-
18
-
-
85027017308
-
Trust-based service management for social internet of things systems
-
Nov./Dec.
-
I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for social Internet of Things systems," IEEE Trans. Depend. Secure Comput., vol. 13, no. 6, pp. 684-696, Nov./Dec. 2016.
-
(2016)
IEEE Trans. Depend. Secure Comput.
, vol.13
, Issue.6
, pp. 684-696
-
-
Chen, I.-R.1
Bao, F.2
Guo, J.3
-
19
-
-
84915766704
-
Building trust in the human-internet of things relationship
-
Nov
-
I. Kounelis et al., "Building trust in the human-Internet of Things relationship," IEEE Technol. Soc. Mag., vol. 33, no. 4, pp. 73-80, Nov. 2014.
-
(2014)
IEEE Technol. Soc. Mag.
, vol.33
, Issue.4
, pp. 73-80
-
-
Kounelis, I.1
-
20
-
-
84961752361
-
Privacy and security in internet of things and wearable devices
-
Apr./Jun.
-
O. Arias, J. Wurm, K. Hoang, and Y. Jin, "Privacy and security in Internet of Things and wearable devices," IEEE Trans. Multi-Scale Comput. Syst., vol. 1, no. 2, pp. 99-109, Apr./Jun. 2015.
-
(2015)
IEEE Trans. Multi-Scale Comput. Syst.
, vol.1
, Issue.2
, pp. 99-109
-
-
Arias, O.1
Wurm, J.2
Hoang, K.3
Jin, Y.4
-
21
-
-
84941085241
-
Internet of things: A survey on enabling technologies, protocols, and applications
-
4th Quart
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
22
-
-
84923456856
-
Hierarchical data aggregation using compressive sensing (HDACS) in WSNs
-
X. Xu, R. Ansari, A. Khokhar, and A. V. Vasilakos, "Hierarchical data aggregation using compressive sensing (HDACS) in WSNs," ACM Trans. Sensor Netw., vol. 11, no. 3, 2015, Art. no. 45.
-
(2015)
ACM Trans. Sensor Netw.
, vol.11
, Issue.3
-
-
Xu, X.1
Ansari, R.2
Khokhar, A.3
Vasilakos, A.V.4
-
23
-
-
84959335910
-
When things matter: A survey on data-centric internet of things
-
Apr.
-
Y. Qin et al., "When things matter: A survey on data-centric Internet of Things," J. Netw. Comput. Appl., vol. 64, pp. 137-153, Apr. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.64
, pp. 137-153
-
-
Qin, Y.1
-
24
-
-
84991071444
-
Software-defined industrial internet of things in the context of industry 4.0
-
Oct.
-
J. Wan et al., "Software-defined industrial Internet of Things in the context of industry 4.0," IEEE Sensors J., vol. 16, no. 20, pp. 7373-7380, Oct. 2016.
-
(2016)
IEEE Sensors J.
, vol.16
, Issue.20
, pp. 7373-7380
-
-
Wan, J.1
-
25
-
-
85006074230
-
Enabling IoT interoperability through opportunistic smartphone-based mobile gateways
-
Mar.
-
G. Aloi et al., "Enabling IoT interoperability through opportunistic smartphone-based mobile gateways," J. Netw. Comput. Appl., vol. 81, pp. 74-84, Mar. 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.81
, pp. 74-84
-
-
Aloi, G.1
-
26
-
-
85048032502
-
-
Cham, Switzerland: Springer
-
R. Gravina, C. E. Palau, M. Manso, A. Liotta, and G. Fortino, Integration, Interconnection, and Interoperability of IoT Systems. Cham, Switzerland: Springer, 2018.
-
(2018)
Integration, Interconnection, and Interoperability of IoT Systems
-
-
Gravina, R.1
Palau, C.E.2
Manso, M.3
Liotta, A.4
Fortino, G.5
-
27
-
-
84977611874
-
A mobile multi-technology gateway to enable IoT interoperability
-
Berlin, Germany
-
G. Aloi et al., "A mobile multi-technology gateway to enable IoT interoperability," in Proc. IEEE 1st Int. Conf. Internet Things Design Implement. (IoTDI), Berlin, Germany, 2016, pp. 259-264.
-
(2016)
Proc. IEEE 1st Int. Conf. Internet Things Design Implement. (IoTDI)
, pp. 259-264
-
-
Aloi, G.1
-
28
-
-
84892614267
-
A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities
-
Dec.
-
Z. Sheng et al., "A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities," IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.6
, pp. 91-98
-
-
Sheng, Z.1
-
29
-
-
84979824607
-
A survey on wireless security: Technical challenges, recent advances, and future trends
-
Sep.
-
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
-
(2016)
Proc. IEEE
, vol.104
, Issue.9
, pp. 1727-1765
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Hanzo, L.4
-
30
-
-
84965126202
-
Black networks for bluetooth low energy
-
Las Vegas, NV, USA
-
S. Chakrabarty and D. W. Engels, "Black networks for Bluetooth low energy," in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Las Vegas, NV, USA, 2016, pp. 11-14.
-
(2016)
Proc. IEEE Int. Conf. Consum. Electron. (ICCE)
, pp. 11-14
-
-
Chakrabarty, S.1
Engels, D.W.2
-
31
-
-
84979784055
-
Assessing vulnerabilities in bluetooth low energy (BLE) wireless network based IoT systems
-
New York, NY, USA
-
Y. Qu and P. Chan, "Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems," in Proc. IEEE 2nd Int. Conf. Big Data Security Cloud (BigDataSecurity), New York, NY, USA, 2016, pp. 42-48.
-
(2016)
Proc. IEEE 2nd Int. Conf. Big Data Security Cloud (BigDataSecurity)
, pp. 42-48
-
-
Qu, Y.1
Chan, P.2
-
32
-
-
84981262574
-
A comparative study of WLAN security protocols: WPA, WPA2
-
Dhaka, Bangladesh
-
A. H. Adnan et al., "A comparative study of WLAN security protocols: WPA, WPA2," in Proc. Int. Conf. Adv. Elect. Eng. (ICAEE), Dhaka, Bangladesh, 2015, pp. 165-169.
-
(2015)
Proc. Int. Conf. Adv. Elect. Eng. (ICAEE)
, pp. 165-169
-
-
Adnan, A.H.1
-
33
-
-
84925299747
-
Comparative study on 4G/LTE cryptographic algorithms based on different factors
-
Jul.
-
A. G. Sulaiman and I. F. Al Shaikhli, "Comparative study On 4G/LTE cryptographic algorithms based on different factors," Int. J. Comput. Sci. Telecommun., vol. 5, no. 7, pp. 7-10, Jul. 2014.
-
(2014)
Int. J. Comput. Sci. Telecommun.
, vol.5
, Issue.7
, pp. 7-10
-
-
Sulaiman, A.G.1
Al Shaikhli, I.F.2
-
34
-
-
85079333518
-
Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security
-
Y. E. Gelogo, R. D. Caytiles, and B. Park, "Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security," Int. J. Control Autom., vol. 4, no. 4, pp. 179-184, 2011.
-
(2011)
Int. J. Control Autom.
, vol.4
, Issue.4
, pp. 179-184
-
-
Gelogo, Y.E.1
Caytiles, R.D.2
Park, B.3
-
35
-
-
84908448624
-
Security protocols and privacy issues into 6LoWPAN stack: A synthesis
-
Oct.
-
C. Hennebert and J. D. Santos, "Security protocols and privacy issues into 6LoWPAN stack: A synthesis," IEEE Internet Things J., vol. 1, no. 5, pp. 384-398, Oct. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.5
, pp. 384-398
-
-
Hennebert, C.1
Santos, J.D.2
-
36
-
-
85053222434
-
-
(Dec.). [Online]
-
(Dec. 2014). Bluetooth Core Version 4.2. [Online]. Available: https://www.bluetooth.com/specifications/adopted-specifications
-
(2014)
Bluetooth Core Version 4.2
-
-
-
37
-
-
85040194352
-
-
Accessed: Nov. [Online]
-
A Basic Introduction to BLE Security. Accessed: Nov. 2016. [Online]. Available: https://eewiki.net/display/Wireless/A+Basic+Introduction+ to+BLE+Security
-
(2016)
A Basic Introduction to BLE Security
-
-
-
39
-
-
84964958468
-
-
Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, [Online]
-
"RPL: IPv6 routing protocol for low-power and lossy networks," Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6550
-
(2012)
RPL: IPv6 Routing Protocol for Low-power and Lossy Networks
-
-
-
40
-
-
84938672829
-
Security for the internet of things: A survey of existing protocols and open research issues
-
3rd Quart
-
J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues," IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
41
-
-
84885328301
-
SVELTE: Real-time intrusion detection in the internet of things
-
Nov
-
S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2661-2674, Nov. 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
42
-
-
84946950129
-
Secure MQTT for internet of things (IoT)
-
Gwalior, India
-
M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Proc. 5th Int. Conf. Commun. Syst. Netw. Technol., Gwalior, India, 2015, pp. 746-751.
-
(2015)
Proc. 5th Int. Conf. Commun. Syst. Netw. Technol.
, pp. 746-751
-
-
Singh, M.1
Rajan, M.A.2
Shivraj, V.L.3
Balamuralidhar, P.4
-
43
-
-
84906994292
-
Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
-
Sydney, NSW, Australia
-
X. Wang, J. Zhang, E. M. Schooler, and M. Ion, "Performance evaluation of attribute-based encryption: Toward data privacy in the IoT," in Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, pp. 725-730.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 725-730
-
-
Wang, X.1
Zhang, J.2
Schooler, E.M.3
Ion, M.4
-
44
-
-
84917692605
-
Enforcement of security policy rules for the internet of things
-
Larnaca, Cyprus
-
R. Neisse, G. Steri, and G. Baldini, "Enforcement of security policy rules for the Internet of Things," in Proc. IEEE 10th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob), Larnaca, Cyprus, 2014, pp. 165-172.
-
(2014)
Proc. IEEE 10th Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob)
, pp. 165-172
-
-
Neisse, R.1
Steri, G.2
Baldini, G.3
-
45
-
-
84949626528
-
SecKit: A model-based security toolkit for the internet of things
-
Oct.
-
R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, "SecKit: A model-based security toolkit for the Internet of Things," Comput. Security, vol. 54, pp. 60-76, Oct. 2015.
-
(2015)
Comput. Security
, vol.54
, pp. 60-76
-
-
Neisse, R.1
Steri, G.2
Fovino, I.N.3
Baldini, G.4
-
47
-
-
84973547225
-
Security analysis of IoT protocols: A focus in CoAP
-
Muscat, Oman
-
R. A. Rahman and B. Shah, "Security analysis of IoT protocols: A focus in CoAP," in Proc. 3rd MEC Int. Conf. Big Data Smart City (ICBDSC), Muscat, Oman, 2016, pp. 1-7.
-
(2016)
Proc. 3rd MEC Int. Conf. Big Data Smart City (ICBDSC)
, pp. 1-7
-
-
Rahman, R.A.1
Shah, B.2
-
48
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
Oct.
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure CoAP for the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3711-3720, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
49
-
-
85006728515
-
A security analysis on standard IoT protocols
-
Craiova, Romania
-
S. Zamfir, T. Balan, I. Iliescu, and F. Sandu, "A security analysis on standard IoT protocols," in Proc. Int. Conf. Appl. Theor. Electricity (ICATE), Craiova, Romania, 2016, pp. 1-6.
-
(2016)
Proc. Int. Conf. Appl. Theor. Electricity (ICATE)
, pp. 1-6
-
-
Zamfir, S.1
Balan, T.2
Iliescu, I.3
Sandu, F.4
-
50
-
-
85053198839
-
-
Accessed: Mar. [Online]
-
CVSS. Accessed: Mar. 2017. [Online]. Available: https://en.wikipedia.org/wiki/CVSS
-
(2017)
CVSS
-
-
-
51
-
-
85053206978
-
-
Accessed: Mar. [Online]
-
CVSSv2. Accessed: Mar. 2017. [Online]. Available: https://www.first.org/cvss/v2/guide
-
(2017)
CVSSv2
-
-
-
53
-
-
85053221554
-
-
Accessed: Mar. [Online]
-
OWASP Project. Accessed: Mar. 2017. [Online]. Available: https://www.owasp.org/ index.php/OWASP-Internet-of-Things-Project
-
(2017)
OWASP Project
-
-
-
54
-
-
85027987303
-
-
Accessed: Mar. [Online]
-
The Internet of Things (IoT): An Overview. Accessed: Mar. 2017. [Online]. Available: https://www.internetsociety.org/doc/iot-overview
-
(2017)
The Internet of Things (IoT): An Overview
-
-
-
55
-
-
85053188396
-
Internet of things (IoT): Application systems and security vulnerabilities
-
Ras al-Khaimah, UAE
-
J. Ahamed and A. V. Rajan, "Internet of Things (IoT): Application systems and security vulnerabilities," in Proc. 5th Int. Conf. Electron. Devices Syst. Appl. (ICEDSA), Ras al-Khaimah, UAE, 2016, pp. 1-5.
-
(2016)
Proc. 5th Int. Conf. Electron. Devices Syst. Appl. (ICEDSA)
, pp. 1-5
-
-
Ahamed, J.1
Rajan, A.V.2
|