메뉴 건너뛰기




Volumn 39, Issue , 2018, Pages 499-507

Security and privacy challenges in smart cities

Author keywords

Cyber physical systems; Information security; Privacy protection; Smart cities

Indexed keywords

CLUSTERING ALGORITHMS; COMPUTER PRIVACY; CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; SECURITY OF DATA;

EID: 85044516589     PISSN: 22106707     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scs.2018.02.039     Document Type: Article
Times cited : (251)

References (38)
  • 1
    • 85044500553 scopus 로고    scopus 로고
    • Apprenda. Iaas, PaaS, SaaS (explained and compared). Accessed 20.07.16.
    • Apprenda. Iaas, PaaS, SaaS (explained and compared). http://apprenda.com/library/paas/iaas-paas-saas-explained-compared Accessed 20.07.16.
  • 3
    • 85044504415 scopus 로고    scopus 로고
    • Cybersecurity challenges: A view from the private sector
    • Basi, T., Cybersecurity challenges: A view from the private sector. 2016, April http://www.serene-risc.ca/en.
    • (2016)
    • Basi, T.1
  • 4
    • 85044520842 scopus 로고    scopus 로고
    • Critical infrastructure threat landscape: Understanding and reacting
    • Bosco, F., Critical infrastructure threat landscape: Understanding and reacting. 2016, April http://www.serene-risc.ca/en.
    • (2016)
    • Bosco, F.1
  • 8
    • 84901690626 scopus 로고    scopus 로고
    • Cyber security challenges in smart cities: Safety, security and privacy
    • Elmaghraby, A.S., Losavio, M.M., Cyber security challenges in smart cities: Safety, security and privacy. Journal of advanced research 5:4 (2014), 491–497.
    • (2014) Journal of advanced research , vol.5 , Issue.4 , pp. 491-497
    • Elmaghraby, A.S.1    Losavio, M.M.2
  • 9
    • 85027994385 scopus 로고    scopus 로고
    • HPE security research, cyber risk report 2016
    • Enterprise, H.P., HPE security research, cyber risk report 2016., 2016, February.
    • (2016)
    • Enterprise, H.P.1
  • 10
    • 85044517786 scopus 로고    scopus 로고
    • Research and development when enforcing cybercrime and cybersecurity in France
    • Freyssinet, E., Research and development when enforcing cybercrime and cybersecurity in France. 2016, April http://www.serene-risc.ca/en.
    • (2016)
    • Freyssinet, E.1
  • 20
    • 85044518180 scopus 로고    scopus 로고
    • Cybersecurity challenges: A view from the public sector
    • Lum, W., Cybersecurity challenges: A view from the public sector. 2016, April http://www.serene-risc.ca/en.
    • (2016)
    • Lum, W.1
  • 22
    • 77958579043 scopus 로고    scopus 로고
    • Privacy-preserving data mining: A feature set partitioning approach
    • Matatov, N., Rokach, L., Maimon, O., Privacy-preserving data mining: A feature set partitioning approach. Information Sciences 180:14 (2010), 2696–2720.
    • (2010) Information Sciences , vol.180 , Issue.14 , pp. 2696-2720
    • Matatov, N.1    Rokach, L.2    Maimon, O.3
  • 27
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interdependencies
    • Rinaldi, S., Peerenboom, J., Kelly, T., Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21:6 (2001), 11–25.
    • (2001) IEEE Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 29
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • Sabater, J., Sierra, C., Review on computational trust and reputation models. Artificial Intelligence Review 24:1 (2005), 33–60.
    • (2005) Artificial Intelligence Review , vol.24 , Issue.1 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 34
    • 85044532587 scopus 로고    scopus 로고
    • We watched a team of hackers ‘fully compromise’ a power company in less than 24 hours
    • Accessed 27.08.16
    • Szoldra, P., We watched a team of hackers ‘fully compromise’ a power company in less than 24 hours. 2016, April Accessed 27.08.16 http://www.techinsider.io/red-team-security-hacking-power-company-2016-4.
    • (2016)
    • Szoldra, P.1
  • 35
    • 85044516496 scopus 로고    scopus 로고
    • o. T. a. A. (2013, July). UT News UT Austin researchers successfully spoof an $80 million yacht at sea. Accessed 11.08.16.
    • T. U. o. T. a. A. (2013, July). UT News UT Austin researchers successfully spoof an $80 million yacht at sea. http://news.utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea Accessed 11.08.16.
    • U, T.1
  • 36
  • 38
    • 33646256588 scopus 로고    scopus 로고
    • The next step: Quantifying infrastructure interdependencies to improve security
    • Zimmerman, R., Restrepo, C., The next step: Quantifying infrastructure interdependencies to improve security. International Journal of Critical Infrastructure 2:2–3 (2006), 215–230.
    • (2006) International Journal of Critical Infrastructure , vol.2 , Issue.2-3 , pp. 215-230
    • Zimmerman, R.1    Restrepo, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.