-
1
-
-
85014093576
-
A survey of standards for machine-to-machine and the internet of things
-
1st Quart
-
V. Gazis, "A survey of standards for machine-to-machine and the Internet of Things," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 482-511, 1st Quart., 2017.
-
(2017)
IEEE Commun. Surveys Tuts.
, vol.19
, Issue.1
, pp. 482-511
-
-
Gazis, V.1
-
2
-
-
84979052575
-
Internet of things: A review of surveys based on context aware intelligent services
-
Jul.
-
D. Gil, A. Ferrández, H. Mora-Mora, and J. Peral, "Internet of Things: A review of surveys based on context aware intelligent services," Sensors, vol. 16, no. 7, Jul. 2016, Art. no. E1069.
-
(2016)
Sensors
, vol.16
, Issue.7
-
-
Gil, D.1
Ferrández, A.2
Mora-Mora, H.3
Peral, J.4
-
3
-
-
84941085241
-
Internet of things: A survey on enabling technologies, protocols, and applications
-
4th Quart
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
4
-
-
84945392187
-
Detecting malicious data injections in wireless sensor networks: A survey
-
Nov.
-
V. P. Illiano and E. C. Lupu, "Detecting malicious data injections in wireless sensor networks: A survey," ACM Comput. Surveys, vol. 48, no. 2, Nov. 2015, Art. no. 24.
-
(2015)
ACM Comput. Surveys
, vol.48
, Issue.2
-
-
Illiano, V.P.1
Lupu, E.C.2
-
5
-
-
78649875960
-
Arbitrary code injection through self-propagating worms in von Neumann architecture devices
-
Dec.
-
T. Giannetsos, T. Dimitriou, I. Krontiris, and N. R. Prasad, "Arbitrary code injection through self-propagating worms in Von Neumann architecture devices," Comput. J., vol. 53, no. 10, pp. 1576-1593, Dec. 2010.
-
(2010)
Comput. J.
, vol.53
, Issue.10
, pp. 1576-1593
-
-
Giannetsos, T.1
Dimitriou, T.2
Krontiris, I.3
Prasad, N.R.4
-
6
-
-
79251600457
-
A study of self-propagating malpackets in sensor networks: Attacks and defenses
-
Jan.
-
Q. Gu, C. Ferguson, and R. Noorani, "A study of self-propagating malpackets in sensor networks: Attacks and defenses," Comput. Security, vol. 30, no. 1, pp. 13-27, Jan. 2011.
-
(2011)
Comput. Security
, vol.30
, Issue.1
, pp. 13-27
-
-
Gu, Q.1
Ferguson, C.2
Noorani, R.3
-
7
-
-
84975263106
-
Improving sensor network immunity under worm attacks: A software diversity approach
-
Sep.
-
Y. Yang, S. Zhu, and G. Cao, "Improving sensor network immunity under worm attacks: A software diversity approach," Ad Hoc Netw., vol. 47, pp. 26-40, Sep. 2016.
-
(2016)
Ad Hoc Netw.
, vol.47
, pp. 26-40
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
-
8
-
-
84919471140
-
Defending connected vehicles against malware: Challenges and a solution framework
-
Feb.
-
T. Zhang, H. Antunes, and S. Aggarwal, "Defending connected vehicles against malware: Challenges and a solution framework," IEEE Internet Things J., vol. 1, no. 1, pp. 10-21, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 10-21
-
-
Zhang, T.1
Antunes, H.2
Aggarwal, S.3
-
9
-
-
84962221484
-
Modeling malicious activities in cyber space
-
Nov./Dec.
-
S. Yu, G. Wang, and W. Zhou, "Modeling malicious activities in cyber space," IEEE Netw., vol. 29, no. 6, pp. 83-87, Nov./Dec. 2015.
-
(2015)
IEEE Netw.
, vol.29
, Issue.6
, pp. 83-87
-
-
Yu, S.1
Wang, G.2
Zhou, W.3
-
10
-
-
84916918672
-
Malware propagation in large-scale networks
-
Jan.
-
S. Yu, G. Gu, A. Barnawi, S. Guo, and I. Stojmenovic, "Malware propagation in large-scale networks," IEEE Trans. Knowl. Data Eng., vol. 27, no. 1, pp. 170-179, Jan. 2015.
-
(2015)
IEEE Trans. Knowl. Data Eng.
, vol.27
, Issue.1
, pp. 170-179
-
-
Yu, S.1
Gu, G.2
Barnawi, A.3
Guo, S.4
Stojmenovic, I.5
-
11
-
-
85013472578
-
A survey of intrusion detection in internet of things
-
Apr.
-
B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, "A survey of intrusion detection in Internet of Things," J. Netw. Comput. Appl., vol. 84, pp. 25-37, Apr. 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.84
, pp. 25-37
-
-
Zarpelão, B.B.1
Miani, R.S.2
Kawakani, C.T.3
De Alvarenga, S.C.4
-
12
-
-
85017561368
-
Internet of things security: A survey
-
Jun.
-
F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, "Internet of Things security: A survey," J. Netw. Comput. Appl., vol. 88, pp. 10-28, Jun. 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.88
, pp. 10-28
-
-
Alaba, F.A.1
Othman, M.2
Hashem, I.A.T.3
Alotaibi, F.4
-
13
-
-
85020708599
-
Security in internet of things: Issues, challenges, taxonomy, and architecture
-
Jun. 10.1007/s11235-017-0345-9
-
V. Adat and B. B. Gupta, "Security in Internet of Things: Issues, challenges, taxonomy, and architecture," Telecommun. Syst., pp. 1-19, Jun. 2017, 10.1007/s11235-017-0345-9.
-
(2017)
Telecommun. Syst.
, pp. 1-19
-
-
Adat, V.1
Gupta, B.B.2
-
14
-
-
84973111531
-
A survey of security issues for cloud computing
-
Aug.
-
M. A. Khan, "A survey of security issues for cloud computing," J. Netw. Comput. Appl., vol. 71, pp. 11-29, Aug. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.71
, pp. 11-29
-
-
Khan, M.A.1
-
15
-
-
84987852363
-
A survey on cloud computing security: Issues, threats, and solutions
-
Nov.
-
S. Singh, Y.-S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," J. Netw. Comput. Appl., vol. 75, pp. 200-222, Nov. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.75
, pp. 200-222
-
-
Singh, S.1
Jeong, Y.-S.2
Park, J.H.3
-
16
-
-
84958935292
-
Integration of cloud computing and internet of things: A survey
-
Mar.
-
A. Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of Cloud computing and Internet of Things: A survey," Future Gener. Comput. Syst., vol. 56, pp. 684-700, Mar. 2016.
-
(2016)
Future Gener. Comput. Syst.
, vol.56
, pp. 684-700
-
-
Botta, A.1
De Donato, W.2
Persico, V.3
Pescapé, A.4
-
17
-
-
84922702919
-
A stochastic evolutionary coalition game model of secure and dependable virtual service in sensorcloud
-
May
-
J. Liu, S. Shen, G. Yue, R. Han, and H. Li, "A stochastic evolutionary coalition game model of secure and dependable virtual service in sensorcloud," Appl. Soft Comput., vol. 30, pp. 123-135, May 2015.
-
(2015)
Appl. Soft Comput.
, vol.30
, pp. 123-135
-
-
Liu, J.1
Shen, S.2
Yue, G.3
Han, R.4
Li, H.5
-
18
-
-
85014086530
-
Networking for big data: A survey
-
1st Quart
-
S. Yu, M. Liu, W. Dou, X. Liu, and S. Zhou, "Networking for big data: A survey," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 531-549, 1st Quart., 2017.
-
(2017)
IEEE Commun. Surveys Tuts.
, vol.19
, Issue.1
, pp. 531-549
-
-
Yu, S.1
Liu, M.2
Dou, W.3
Liu, X.4
Zhou, S.5
-
19
-
-
85015190263
-
Fog computing for the internet of things: Security and privacy issues
-
Mar./Apr.
-
A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues," IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar./Apr. 2017.
-
(2017)
IEEE Internet Comput.
, vol.21
, Issue.2
, pp. 34-42
-
-
Alrawais, A.1
Alhothaily, A.2
Hu, C.3
Cheng, X.4
-
20
-
-
84979812487
-
Big privacy: Challenges and opportunities of privacy study in the age of big data
-
S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data," IEEE Access, vol. 4, pp. 2751-2763, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 2751-2763
-
-
Yu, S.1
-
21
-
-
85019898776
-
Game theory for cyber security and privacy
-
Jun.
-
C. T. Do et al., "Game theory for cyber security and privacy," ACM Comput. Surveys, vol. 50, no. 2, Jun. 2017, Art. no. 30.
-
(2017)
ACM Comput. Surveys
, vol.50
, Issue.2
-
-
Do, C.T.1
-
22
-
-
84874284297
-
Game theory meets network security and privacy
-
Jun.
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacşar, and J. Hubaux, "Game theory meets network security and privacy," ACM Comput. Surveys, vol. 45, no. 3, Jun. 2013, Art. no. 25.
-
(2013)
ACM Comput. Surveys
, vol.45
, Issue.3
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Bacşar, T.4
Hubaux, J.5
-
23
-
-
84973610948
-
Reliability evaluation for clustered WSNs under malware propagation
-
Jun.
-
S. Shen et al., "Reliability evaluation for clustered WSNs under malware propagation," Sensors, vol. 16, no. 6, Jun. 2016, Art. no. 855.
-
(2016)
Sensors
, vol.16
, Issue.6
-
-
Shen, S.1
-
24
-
-
85019114799
-
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion
-
Aug.
-
S. Shen et al., "A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion," J. Netw. Comput. Appl., vol. 91, pp. 26-35, Aug. 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.91
, pp. 26-35
-
-
Shen, S.1
-
25
-
-
85010041836
-
Deceptive attack and defense game in honeypot-enabled networks for the internet of things
-
Dec.
-
Q. D. La, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, "Deceptive attack and defense game in honeypot-enabled networks for the Internet of Things," IEEE Internet Things J., vol. 3, no. 6, pp. 1025-1035, Dec. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.6
, pp. 1025-1035
-
-
La, Q.D.1
Quek, T.Q.S.2
Lee, J.3
Jin, S.4
Zhu, H.5
-
26
-
-
84986218436
-
Economics of internet of things: An information market approach
-
Aug.
-
D. Niyato, X. Lu, P. Wang, D. I. Kim, and Z. Han, "Economics of Internet of Things: An information market approach," IEEE Wireless Commun., vol. 23, no. 4, pp. 136-145, Aug. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.4
, pp. 136-145
-
-
Niyato, D.1
Lu, X.2
Wang, P.3
Kim, D.I.4
Han, Z.5
-
27
-
-
84914816062
-
Information fusion to defend intentional attack in internet of things
-
Aug.
-
P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, "Information fusion to defend intentional attack in Internet of Things," IEEE Internet Things J., vol. 1, no. 4, pp. 337-348, Aug. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.4
, pp. 337-348
-
-
Chen, P.-Y.1
Cheng, S.-M.2
Chen, K.-C.3
-
28
-
-
84976562123
-
Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
-
Jun.
-
M. S. Abdalzaher et al., "Game theory meets wireless sensor networks security requirements and threats mitigation: A survey," Sensors, vol. 16, no. 7, Jun. 2016, Art. no. E1003.
-
(2016)
Sensors
, vol.16
, Issue.7
-
-
Abdalzaher, M.S.1
-
29
-
-
84905736269
-
A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks
-
Sep.
-
H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.9
, pp. 1367-1379
-
-
Moosavi, H.1
Bui, F.M.2
-
30
-
-
84908240474
-
Differential game-based strategies for preventing malware propagation in wireless sensor networks
-
Nov.
-
S. Shen et al., "Differential game-based strategies for preventing malware propagation in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1962-1973, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1962-1973
-
-
Shen, S.1
-
31
-
-
85018921813
-
Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology
-
May
-
H. Sedjelmaci, S. M. Senouci, and N. Ansari, "Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology," IEEE Trans. Intell. Transp. Syst., vol. 18, no. 5, pp. 1143-1153, May 2017.
-
(2017)
IEEE Trans. Intell. Transp. Syst.
, vol.18
, Issue.5
, pp. 1143-1153
-
-
Sedjelmaci, H.1
Senouci, S.M.2
Ansari, N.3
-
32
-
-
84983320365
-
To delay or not: Temporal vaccination games on networks
-
San Francisco, CA, USA
-
A. Adiga, S. Venkat, and A. Vullikanti, "To delay or not: Temporal vaccination games on networks," in Proc. IEEE INFOCOM, San Francisco, CA, USA, 2016, pp. 1-9.
-
(2016)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Adiga, A.1
Venkat, S.2
Vullikanti, A.3
-
33
-
-
84992213754
-
Game-theory-based active defense for intrusion detection in cyber-physical embedded systems
-
Nov.
-
K. Wang et al., "Game-theory-based active defense for intrusion detection in cyber-physical embedded systems," ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, Nov. 2016, Art. no. 18.
-
(2016)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.1
-
-
Wang, K.1
-
34
-
-
84988640333
-
A three-way decision making approach to malware analysis using probabilistic rough sets
-
Dec.
-
M. Nauman, N. Azam, and J. Yao, "A three-way decision making approach to malware analysis using probabilistic rough sets," Inf. Sci., vol. 374, pp. 193-209, Dec. 2016.
-
(2016)
Inf. Sci.
, vol.374
, pp. 193-209
-
-
Nauman, M.1
Azam, N.2
Yao, J.3
-
35
-
-
85028048302
-
Epidemic protection over heterogeneous networks using evolutionary Poisson games
-
Aug.
-
Y. Hayel and Q. Zhu, "Epidemic protection over heterogeneous networks using evolutionary Poisson games," IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1786-1800, Aug. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.8
, pp. 1786-1800
-
-
Hayel, Y.1
Zhu, Q.2
-
36
-
-
84922357776
-
Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach
-
Jul.
-
Y. Yuan, F. Sun, and H. Liu, "Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach," Int. J. Syst. Sci., vol. 47, no. 9, pp. 2067-2077, Jul. 2016.
-
(2016)
Int. J. Syst. Sci.
, vol.47
, Issue.9
, pp. 2067-2077
-
-
Yuan, Y.1
Sun, F.2
Liu, H.3
-
37
-
-
84943272411
-
Mobile cloud offloading for malware detections with learning
-
Y. Li, J. Liu, Q. Li, and L. Xiao, "Mobile cloud offloading for malware detections with learning," in Proc. IEEE INFOCOM, 2015, pp. 197-201.
-
(2015)
Proc. IEEE INFOCOM
, pp. 197-201
-
-
Li, Y.1
Liu, J.2
Li, Q.3
Xiao, L.4
-
38
-
-
85029672508
-
Cloud-based malware detection game for mobile devices with offloading
-
Oct.
-
L. Xiao, Y. Li, X. Huang, and X. Du, "Cloud-based malware detection game for mobile devices with offloading," IEEE Trans. Mobile Comput., vol. 16, no. 10, pp. 2742-2750, Oct. 2017.
-
(2017)
IEEE Trans. Mobile Comput.
, vol.16
, Issue.10
, pp. 2742-2750
-
-
Xiao, L.1
Li, Y.2
Huang, X.3
Du, X.4
-
39
-
-
84906258306
-
Evolutionary dynamics of information diffusion over social networks
-
Sep.
-
C. Jiang, Y. Chen, and K. J. R. Liu, "Evolutionary dynamics of information diffusion over social networks," IEEE Trans. Signal Process., vol. 62, no. 17, pp. 4573-4586, Sep. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.17
, pp. 4573-4586
-
-
Jiang, C.1
Chen, Y.2
Liu, K.J.R.3
-
40
-
-
84904667776
-
Graphical evolutionary game for information diffusion over social networks
-
Aug.
-
C. Jiang, Y. Chen, and K. J. R. Liu, "Graphical evolutionary game for information diffusion over social networks," IEEE J. Sel. Topics Signal Process., vol. 8, no. 4, pp. 524-536, Aug. 2014.
-
(2014)
IEEE J. Sel. Topics Signal Process.
, vol.8
, Issue.4
, pp. 524-536
-
-
Jiang, C.1
Chen, Y.2
Liu, K.J.R.3
-
41
-
-
84971463486
-
On maximizing diffusion speed over social networks with strategic users
-
Dec.
-
J. Ok, Y. Jin, J. Shin, and Y. Yi, "On maximizing diffusion speed over social networks with strategic users," IEEE/ACM Trans. Netw., vol. 24, no. 6, pp. 3798-3811, Dec. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.6
, pp. 3798-3811
-
-
Ok, J.1
Jin, Y.2
Shin, J.3
Yi, Y.4
-
42
-
-
84980398323
-
Infection spreading and source identification: A hide and seek game
-
Aug.
-
W. Luo, W. P. Tay, and M. Leng, "Infection spreading and source identification: A hide and seek game," IEEE Trans. Signal Process., vol. 64, no. 16, pp. 4228-4243, Aug. 2016.
-
(2016)
IEEE Trans. Signal Process.
, vol.64
, Issue.16
, pp. 4228-4243
-
-
Luo, W.1
Tay, W.P.2
Leng, M.3
-
43
-
-
85017503282
-
Modeling for information diffusion in online social networks via hydrodynamics
-
Y. Hu, R. J. Song, and M. Chen, "Modeling for information diffusion in online social networks via hydrodynamics," IEEE Access, vol. 5, pp. 128-135, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 128-135
-
-
Hu, Y.1
Song, R.J.2
Chen, M.3
-
44
-
-
85008163210
-
Intelligent intrusion detection in low-power IoTs
-
Dec.
-
A. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, "Intelligent intrusion detection in low-power IoTs," ACM Trans. Internet Technol., vol. 16, no. 4, Dec. 2016, Art. no. 27.
-
(2016)
ACM Trans. Internet Technol.
, vol.16
, Issue.4
-
-
Saeed, A.1
Ahmadinia, A.2
Javed, A.3
Larijani, H.4
-
45
-
-
85008234792
-
Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach
-
Jan.
-
H. Bostani and M. Sheikhan, "Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach," Comput. Commun., vol. 98, pp. 52-71, Jan. 2017.
-
(2017)
Comput. Commun.
, vol.98
, pp. 52-71
-
-
Bostani, H.1
Sheikhan, M.2
-
46
-
-
85009909010
-
CLAPP: A self constructing feature clustering approach for anomaly detection
-
Sep.
-
R. K. Gunupudi, M. Nimmala, N. Gugulothu, and S. R. Gali, "CLAPP: A self constructing feature clustering approach for anomaly detection," Future Gener. Comput. Syst., vol. 74, pp. 417-429, Sep. 2017.
-
(2017)
Future Gener. Comput. Syst.
, vol.74
, pp. 417-429
-
-
Gunupudi, R.K.1
Nimmala, M.2
Gugulothu, N.3
Gali, S.R.4
-
47
-
-
85006802692
-
DFA-AD: A distributed framework architecture for the detection of advanced persistent threats
-
Mar.
-
P. K. Sharma, S. Y. Moon, D. Moon, and J. H. Park, "DFA-AD: A distributed framework architecture for the detection of advanced persistent threats," Cluster Comput., vol. 20, no. 1, pp. 597-609, Mar. 2017.
-
(2017)
Cluster Comput.
, vol.20
, Issue.1
, pp. 597-609
-
-
Sharma, P.K.1
Moon, S.Y.2
Moon, D.3
Park, J.H.4
-
48
-
-
84885328301
-
SVELTE: Real-time intrusion detection in the internet of things
-
Nov.
-
S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2661-2674, Nov. 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
49
-
-
84900000372
-
Security as a service model for cloud environment
-
Mar.
-
V. Varadharajan and U. Tupakula, "Security as a service model for cloud environment," IEEE Trans. Netw. Service Manag., vol. 11, no. 1, pp. 60-75, Mar. 2014.
-
(2014)
IEEE Trans. Netw. Service Manag.
, vol.11
, Issue.1
, pp. 60-75
-
-
Varadharajan, V.1
Tupakula, U.2
-
50
-
-
84977485940
-
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices
-
Mar.
-
H. Sun, X. Wang, R. Buyya, and J. Su, "CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained Internet of Things (IoT) devices," Softw. Pract. Exp., vol. 47, no. 3, pp. 421-441, Mar. 2017.
-
(2017)
Softw. Pract. Exp.
, vol.47
, Issue.3
, pp. 421-441
-
-
Sun, H.1
Wang, X.2
Buyya, R.3
Su, J.4
-
51
-
-
85021783326
-
Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach
-
Nov.
-
J. Chen and Q. Zhu, "Security as a service for cloud-enabled Internet of controlled things under advanced persistent threats: A contract design approach," IEEE Trans. Inf. Forensics Security, vol. 12, no. 11, pp. 2736-2750, Nov. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.11
, pp. 2736-2750
-
-
Chen, J.1
Zhu, Q.2
-
52
-
-
84983503423
-
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
-
Oct.
-
S. Iqbal et al., "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service," J. Netw. Comput. Appl., vol. 74, pp. 98-120, Oct. 2016.
-
(2016)
J. Netw. Comput. Appl.
, vol.74
, pp. 98-120
-
-
Iqbal, S.1
-
53
-
-
85021058978
-
IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future internet of things
-
Jul.
-
A. Munir, P. Kansakar, and S. U. Khan, "IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future Internet of Things," IEEE Consum. Electron. Mag., vol. 6, no. 3, pp. 74-82, Jul. 2017.
-
(2017)
IEEE Consum. Electron. Mag.
, vol.6
, Issue.3
, pp. 74-82
-
-
Munir, A.1
Kansakar, P.2
Khan, S.U.3
-
54
-
-
85010031130
-
Fog and IoT: An overview of research opportunities
-
Dec.
-
M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities," IEEE Internet Things J., vol. 3, no. 6, pp. 854-864, Dec. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.6
, pp. 854-864
-
-
Chiang, M.1
Zhang, T.2
-
55
-
-
85012981859
-
EdgeIoT: Mobile edge computing for the internet of things
-
Dec.
-
X. Sun and N. Ansari, "EdgeIoT: Mobile edge computing for the Internet of Things," IEEE Commun. Mag., vol. 54, no. 12, pp. 22-29, Dec. 2016.
-
(2016)
IEEE Commun. Mag.
, vol.54
, Issue.12
, pp. 22-29
-
-
Sun, X.1
Ansari, N.2
-
56
-
-
85012170641
-
Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems
-
Oct.
-
X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G.-J. Ren, "Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems," IEEE Wireless Commun., vol. 23, no. 5, pp. 120-128, Oct. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.5
, pp. 120-128
-
-
Masip-Bruin, X.1
Marín-Tordera, E.2
Tashakor, G.3
Jukan, A.4
Ren, G.-J.5
-
57
-
-
84986211321
-
Fog computing: Helping the internet of things realize its potential
-
Aug.
-
A. V. Dastjerdi and R. Buyya, "Fog computing: Helping the Internet of Things realize its potential," Computer, vol. 49, no. 8, pp. 112-116, Aug. 2016.
-
(2016)
Computer
, vol.49
, Issue.8
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
58
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
1st Quart
-
I. Butun, S. D. Morgera, and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 266-282, 1st Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
59
-
-
85021862331
-
On the tradeoff between privacy and utility in collaborative intrusion detection systems-A game theoretical approach
-
R. Jin, X. He, and H. Dai, "On the tradeoff between privacy and utility in collaborative intrusion detection systems-A game theoretical approach," in Proc. ACM Int. Conf. HoTSoS, 2017, pp. 45-51.
-
(2017)
Proc. ACM Int. Conf. HoTSoS
, pp. 45-51
-
-
Jin, R.1
He, X.2
Dai, H.3
|