-
2
-
-
85065679631
-
-
Int. Data Corporat., Framingham, MA, USA
-
Internet of Things Market Statistics, Int. Data Corporat., Framingham, MA, USA, 2016. [Online]. Available: http://www.ironpaper.com/ webintel/articles/internet-of-things-market-statistics/
-
(2016)
Internet of Things Market Statistics
-
-
-
3
-
-
85061427382
-
-
Bigthink Edge
-
Bigthink Edge. (2016). Hacking the Human Heart. [Online]. Available: http://bigthink.com/future-crimes/hacking-The-human-heart
-
(2016)
Hacking the Human Heart
-
-
-
4
-
-
85061448243
-
-
Envista Forensics
-
Envista Forensics. (2015). The Most Hackable Cars on the Road. [Online]. Available: http://www.envistaforensics.com/news/themost-hackable-cars-on-The-road-1
-
(2015)
The Most Hackable Cars on the Road
-
-
-
5
-
-
85045689875
-
-
Wikipedia. 2016 Dyn Cyberattack. [Online]. Available: https:// en.wikipedia.org/w/index.php?title=2016Dyncyberattack&oldid=763 071700
-
(2016)
Dyn Cyberattack
-
-
-
6
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
May/Jun
-
R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May/Jun. 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
9
-
-
84961579337
-
The Internet of Things: A security point of view
-
S. Li, T. Tryfonas, and H. Li, "The Internet of Things: A security point of view," Internet Res., vol. 26, no. 2, pp. 337-359, 2016.
-
(2016)
Internet Res
, vol.26
, Issue.2
, pp. 337-359
-
-
Li, S.1
Tryfonas, T.2
Li, H.3
-
10
-
-
85026378512
-
A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications
-
Oct
-
J. Lin et al., "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1125-1142
-
-
Lin, J.1
-
11
-
-
85065680560
-
Afety, security, and privacy threats posed by accelerating trends in the Internet of Things
-
Washington, DC, USA, Rep
-
K. Fu et al., "Afety, security, and privacy threats posed by accelerating trends in the Internet of Things," Comput. Community Consortium, Washington, DC, USA, Rep., 2017. [Online]. Available: http://cra.org/ ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT.pdf
-
(2017)
Comput. Community Consortium
-
-
Fu, K.1
-
12
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of Things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of Things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, 2013.
-
(2013)
Comput. Netw
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
13
-
-
84919372488
-
Security, privacy and trust in Internet of Things: The road ahead
-
Jan
-
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Comput. Netw. Int. J. Comput. Telecommun. Netw., vol. 76, pp. 146-164, Jan. 2015.
-
(2015)
Comput. Netw. Int. J. Comput. Telecommun. Netw
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
14
-
-
85030314760
-
A survey on security and privacy issues in Internet-of-Things
-
Oct
-
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, "A survey on security and privacy issues in Internet-of-Things," IEEE Internet Things J., vol. 4, no. 5, pp. 1250-1258, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1250-1258
-
-
Yang, Y.1
Wu, L.2
Yin, G.3
Li, L.4
Zhao, H.5
-
15
-
-
84922933943
-
Low-energy security: Limits and opportunities in the Internet of Things
-
Jan./Feb
-
W. Trappe, R. Howard, and R. S. Moore, "Low-energy security: Limits and opportunities in the Internet of Things," IEEE Security Privacy, vol. 13, no. 1, pp. 14-21, Jan./Feb. 2015.
-
(2015)
IEEE Security Privacy
, vol.13
, Issue.1
, pp. 14-21
-
-
Trappe, W.1
Howard, R.2
Moore, R.S.3
-
16
-
-
85065677995
-
-
L. Tibbets and J. Tane. (2012). IFTTT. [Online]. Available: https://platform.ifttt.com/
-
(2012)
IFTTT
-
-
Tibbets, L.1
Tane, J.2
-
17
-
-
84945190529
-
-
Samsung
-
Samsung. (2014). SmartThings. [Online]. Available: https://www.smartthings.com/
-
(2014)
SmartThings
-
-
-
18
-
-
85065681241
-
-
Apple
-
Apple. (2014). HomeKit. [Online]. Available: https://developer.apple.com/homekit/
-
(2014)
HomeKit
-
-
-
19
-
-
85065679636
-
-
Amazon
-
Amazon. (2012). Alexa. [Online]. Available: https://developer.amazon.com/alexa
-
(2012)
Alexa
-
-
-
20
-
-
84987660714
-
Security analysis of emerging smart home applications
-
San Jose, CA, USA
-
E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," in Proc. IEEE Security Privacy, San Jose, CA, USA, 2016, pp. 636-654.
-
(2016)
Proc. IEEE Security Privacy
, pp. 636-654
-
-
Fernandes, E.1
Jung, J.2
Prakash, A.3
-
21
-
-
84962691282
-
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
-
T. Yu et al., "Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things," in Proc. ACM Workshop Hot Topics Netw., 2015, p. 5.
-
(2015)
Proc. ACM Workshop Hot Topics Netw
, pp. 5
-
-
Yu, T.1
-
22
-
-
85159782356
-
ContexIoT: Towards providing contextual integrity to appified IoT platforms
-
Y. J. Jia et al., "ContexIoT: Towards providing contextual integrity to appified IoT platforms," in Proc. Netw. Distrib. Syst. Security Symp., 2017, pp. 1-15.
-
(2017)
Proc. Netw. Distrib. Syst. Security Symp
, pp. 1-15
-
-
Jia, Y.J.1
-
23
-
-
85065681722
-
-
JD Alpha
-
JD Alpha. (2015). Joylink. [Online]. Available: http:// smartdev.jd.com/
-
(2015)
, pp. Joylink
-
-
-
24
-
-
85065681962
-
-
Alibaba
-
Alibaba. (2015). Alink. [Online]. Available: https:// open.aliplus.com/docs/open/
-
(2015)
Alink
-
-
-
25
-
-
84946397217
-
-
Alibaba
-
Alibaba. (2015). Internet of Things Security Report. [Online]. Available: https://jaq.alibaba.com/community/art/show?articleid=195
-
(2015)
Internet of Things Security Report
-
-
-
26
-
-
85037062546
-
-
Network Working Group Internet-Draft
-
Network Working Group Internet-Draft. (2017). Secure IoT Bootstrapping: A Survey. [Online]. Available: https://tools.ietf.org/ html/draft-sarikaya-t2trg-sbootstrapping-03
-
(2017)
Secure IoT Bootstrapping: A Survey
-
-
-
27
-
-
85037080392
-
Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
-
Dallas, TX, USA
-
H. Liu et al., "Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices," in Proc. IoT Security Privacy Workshop, Dallas, TX, USA, 2017, pp. 13-18.
-
(2017)
Proc. IoT Security Privacy Workshop
, pp. 13-18
-
-
Liu, H.1
-
29
-
-
85065678865
-
Security of cyber-physical systems
-
J. Rubio-Hernan, J. Rodolfo-Mejias, and J. Garcia-Alfaro, "Security of cyber-physical systems," in Proc. Conf. Security Ind. Control Cyber Phys. Syst., 2016, pp. 3-18.
-
(2016)
Proc. Conf. Security Ind. Control Cyber Phys. Syst
, pp. 3-18
-
-
Rubio-Hernan, J.1
Rodolfo-Mejias, J.2
Garcia-Alfaro, J.3
-
30
-
-
85075533110
-
FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution
-
D. Davidson, B. Moench, S. Jha, and T. Ristenpart, "FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution," in Proc. USENIX Security Symp., 2013, pp. 463-478.
-
(2013)
Proc. USENIX Security Symp
, pp. 463-478
-
-
Davidson, D.1
Moench, B.2
Jha, S.3
Ristenpart, T.4
-
31
-
-
84977858742
-
-
Nat. Down Synd. Soc., New York, NY, USA
-
J. Zaddach, L. Bruno, A. Francillon, and D. Balzarotti, AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares, Nat. Down Synd. Soc., New York, NY, USA, 2014.
-
(2014)
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares
-
-
Zaddach, J.1
Bruno, L.2
Francillon, A.3
Balzarotti, D.4
-
32
-
-
85169465657
-
Towards automated dynamic analysis for Linux-based embedded firmware
-
D. D. Chen, M. Egele, M. Woo, and D. Brumley, "Towards automated dynamic analysis for Linux-based embedded firmware," in Proc. Netw. Distrib. Syst. Security Symp., 2016, pp. 1-16.
-
(2016)
Proc. Netw. Distrib. Syst. Security Symp
, pp. 1-16
-
-
Chen, D.D.1
Egele, M.2
Woo, M.3
Brumley, D.4
-
33
-
-
84954527190
-
Through the eye of the PLC
-
D. Hadẑiosmanovic, R. Sommer, E. Zambon, and P. H. Hartel, "Through the eye of the PLC," in Proc. Comput. Security Appl. Conf., New Orleans, LA, USA, 2014, pp. 126-135.
-
(2014)
Proc. Comput. Security Appl. Conf., New Orleans, LA, USA
, pp. 126-135
-
-
Hadẑiosmanovic, D.1
Sommer, R.2
Zambon, E.3
Hartel, P.H.4
-
34
-
-
85037543508
-
Network analysis of reconnaissance and intrusion of an industrial control system
-
U.S. Army Res. Lab., Adelphi, MD, USA, Rep. ARL-TR-7775
-
D. T. Sullivan and E. J. Colbert, "Network analysis of reconnaissance and intrusion of an industrial control system," Comput. Inf. Sci. Directorate, U.S. Army Res. Lab., Adelphi, MD, USA, Rep. ARL-TR-7775, 2016.
-
(2016)
Comput. Inf. Sci. Directorate
-
-
Sullivan, D.T.1
Colbert, E.J.2
-
35
-
-
80455129085
-
ARMor: Fully verified software fault isolation
-
Taipei, Taiwan
-
L. Zhao, G. Li, B. D. Sutter, and J. Regehr, "ARMor: Fully verified software fault isolation," in Proc. IEEE Int. Conf. Embedded Softw., Taipei, Taiwan, 2011, pp. 289-298.
-
(2011)
Proc. IEEE Int. Conf. Embedded Softw
, pp. 289-298
-
-
Zhao, L.1
Li, G.2
Sutter, B.D.3
Regehr, J.4
-
36
-
-
84900427392
-
TrustLite: A security architecture for tiny embedded devices
-
Amsterdam, The Netherlands
-
P. Schulz, S. Koeberl, A.-R. Sadeghi, and V. Varadharajan, "TrustLite: A security architecture for tiny embedded devices," in Proc. ACM EuroSys, Amsterdam, The Netherlands, 2014, pp. 1-14.
-
(2014)
Proc. ACM EuroSys
, pp. 1-14
-
-
Schulz, P.1
Koeberl, S.2
Sadeghi, A.-R.3
Varadharajan, V.4
-
37
-
-
85024501556
-
Protecting bare-metal embedded systems with privilege overlays
-
San Jose, CA, USA
-
A. A. Clements et al., "Protecting bare-metal embedded systems with privilege overlays," in Proc. IEEE Security Privacy, San Jose, CA, USA, 2017, pp. 289-303.
-
(2017)
Proc. IEEE Security Privacy
, pp. 289-303
-
-
Clements, A.A.1
-
38
-
-
85126212428
-
Securing real-time microcontroller systems through customized memory view switching
-
C. H. Kim et al., "Securing real-time microcontroller systems through customized memory view switching," in Proc. Netw. Distrib. Syst. Security Symp., 2018.
-
(2018)
Proc. Netw. Distrib. Syst. Security Symp
-
-
Kim, C.H.1
-
39
-
-
84898823624
-
CPABE with constant-size keys for lightweight devices
-
May
-
F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, "CPABE with constant-size keys for lightweight devices," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763-771, May 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 763-771
-
-
Guo, F.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Varadharajan, V.5
-
40
-
-
85020028228
-
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices
-
Y. Shi, W. Wei, Z. He, and H. Fan, "An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices," in Proc. ACM Conf. Comput. Security Appl., 2016, pp. 16-29.
-
(2016)
Proc. ACM Conf. Comput. Security Appl
, pp. 16-29
-
-
Shi, Y.1
Wei, W.2
He, Z.3
Fan, H.4
-
41
-
-
84978426218
-
High-performance and lightweight lattice-based public-key encryption
-
J. Buchmann, F. Göpfert, T. Güneysu, T. Oder, and T. Pöppelmann, "High-performance and lightweight lattice-based public-key encryption," in Proc. 2nd ACM Int. Workshop IoT Privacy Trust Security, 2016, pp. 2-9.
-
(2016)
Proc. 2nd ACM Int. Workshop IoT Privacy Trust Security
, pp. 2-9
-
-
Buchmann, J.1
Göpfert, F.2
Güneysu, T.3
Oder, T.4
Pöppelmann, T.5
-
42
-
-
84960430600
-
Privilege-based remote attestation: Towards integrity assurance for lightweight clients
-
T. Rauter, A. Höller, N. Kajtazovic, and C. Kreiner, "Privilege-based remote attestation: Towards integrity assurance for lightweight clients," in Proc. ACM Workshop IoT Privacy Trust Security, 2015, pp. 3-9.
-
(2015)
Proc. ACM Workshop IoT Privacy Trust Security
, pp. 3-9
-
-
Rauter, T.1
Höller, A.2
Kajtazovic, N.3
Kreiner, C.4
-
43
-
-
84864182393
-
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
-
San Francisco, CA, USA
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S.Wallach, and S. Devadas, "Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching," in Proc. IEEE Security Privacy Workshops, San Francisco, CA, USA, 2012. pp. 33-44.
-
(2012)
Proc. IEEE Security Privacy Workshops
, pp. 33-44
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
44
-
-
85001842951
-
Online reliability testing for PUF key derivation
-
M. Hiller, A. G. Önalan, G. Sigl, and M. Bossert, "Online reliability testing for PUF key derivation," in Proc. Int. Workshop Trustworthy Embedded Devices, 2016, pp. 15-22.
-
(2016)
Proc. Int. Workshop Trustworthy Embedded Devices
, pp. 15-22
-
-
Hiller, M.1
Önalan, A.G.2
Sigl, G.3
Bossert, M.4
-
45
-
-
85086456788
-
KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvesting
-
W. Xu et al., "KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvesting," in Proc. Netw. Distrib. Syst. Security Symp., 2017.
-
(2017)
Proc. Netw. Distrib. Syst. Security Symp
-
-
Xu, W.1
-
46
-
-
84958638830
-
Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication
-
R. A. Scheel and A. Tyagi, "Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication," in Proc. Int. Workshop Trustworthy Embedded Devices, 2015, pp. 3-13.
-
(2015)
Proc. Int. Workshop Trustworthy Embedded Devices
, pp. 3-13
-
-
Scheel, R.A.1
Tyagi, A.2
-
47
-
-
85065682168
-
-
Checkpoint Research
-
Checkpoint Research. (2017). IoTroop Botnet: The Full Investigation. [Online]. Available: https://research.checkpoint.com/iotroop-botnet-fullinvestigation/
-
(2017)
IoTroop Botnet: The Full Investigation
-
-
-
48
-
-
85084163626
-
IoTPOT: Analysing the rise of IoT compromises
-
Y. M. P. Pa et al., "IoTPOT: Analysing the rise of IoT compromises," in Proc. USENIX Conf. Offensive Technol., 2015, p. 9.
-
(2015)
Proc. USENIX Conf. Offensive Technol
, pp. 9
-
-
Pa, Y.M.P.1
-
49
-
-
85024497200
-
DDoS in the IoT: Mirai and other botnets
-
Jul
-
C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer, vol. 50, no. 7, pp. 80-84, Jul. 2017.
-
(2017)
Computer
, vol.50
, Issue.7
, pp. 80-84
-
-
Kolias, C.1
Kambourakis, G.2
Stavrou, A.3
Voas, J.4
-
50
-
-
84937792152
-
Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network
-
C. Zhang and R. Green, "Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network," in Proc. Symp. Commun. Netw. Soc. Comput. Simulat. Int., 2015, pp. 8-15.
-
(2015)
Proc. Symp. Commun. Netw. Soc. Comput. Simulat. Int
, pp. 8-15
-
-
Zhang, C.1
Green, R.2
-
51
-
-
84921341664
-
Camouflage traffic: Minimizing message delay for smart grid applications under jamming
-
Jan./Feb
-
Z. Lu, W. Wang, and C. Wang, "Camouflage traffic: Minimizing message delay for smart grid applications under jamming," IEEE Trans. Dependable Secure Comput., vol. 12 no. 1, pp. 31-44, Jan./Feb. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput
, vol.12
, Issue.1
, pp. 31-44
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
52
-
-
84888998142
-
DEMO: An IDS framework for Internet of Things empowered by 6LoWPAN
-
P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, "DEMO: An IDS framework for Internet of Things empowered by 6LoWPAN," in Proc. ACM Sigsac Conf. Comput. Commun. Security, 2013, pp. 1337-1340.
-
(2013)
Proc. ACM Sigsac Conf. Comput. Commun. Security
, pp. 1337-1340
-
-
Kasinathan, P.1
Costamagna, G.2
Khaleel, H.3
Pastrone, C.4
Spirito, M.A.5
-
53
-
-
85073002683
-
SMART: Secure and minimal architecture for (establishing a dynamic) root of trust
-
K. E. Defrawy, A. Francillon, D. Perito, and G. Tsudik, "SMART: Secure and minimal architecture for (establishing a dynamic) root of trust," in Proc. Netw. Distrib. Syst. Security Symp., 2012.
-
(2012)
Proc. Netw. Distrib. Syst. Security Symp
-
-
Defrawy, K.E.1
Francillon, A.2
Perito, D.3
Tsudik, G.4
-
54
-
-
85076321179
-
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
-
J. Noorman et al., "Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base," in Proc. 22nd USENIX Conf. Security, 2013, pp. 479-494.
-
(2013)
Proc. 22nd USENIX Conf. Security
, pp. 479-494
-
-
Noorman, J.1
-
56
-
-
85008684152
-
Is anybody home? Inferring activity from smart home network traffic
-
San Jose, CA, USA
-
B. Copos, K. Levitt, M. Bishop, and J. Rowe, "Is anybody home? Inferring activity from smart home network traffic," in Proc. IEEE Security Privacy Workshops, San Jose, CA, USA, 2016, pp. 245-251.
-
(2016)
Proc. IEEE Security Privacy Workshops
, pp. 245-251
-
-
Copos, B.1
Levitt, K.2
Bishop, M.3
Rowe, J.4
-
57
-
-
84978371900
-
Mind the plug! Laptop-user recognition through power consumption
-
M. Conti, M. Nati, E. Rotundo, and R. Spolaor, "Mind the plug! Laptop-user recognition through power consumption," in Proc. ACM Int. Workshop IoT Privacy Trust Security, 2016, pp. 37-44.
-
(2016)
Proc. ACM Int. Workshop IoT Privacy Trust Security
, pp. 37-44
-
-
Conti, M.1
Nati, M.2
Rotundo, E.3
Spolaor, R.4
-
59
-
-
85065682544
-
-
MarketsandMarkets. Dec
-
MarketsandMarkets. (Dec. 2015). Insurance Telematics Market Worth 2.21 Billion USD by 2020. [Online]. Available: http://www.prnewswire.com/news-releases/insurance-telematics-marketworth-221-billion-usd-by-2020-561817961.html
-
(2015)
Insurance Telematics Market Worth 2.21 Billion USD by 2020
-
-
-
60
-
-
84869385926
-
Minimizing private data disclosures in the smart grid
-
W. Yang et al., "Minimizing private data disclosures in the smart grid," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 415-427.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 415-427
-
-
Yang, W.1
-
61
-
-
85082399292
-
Understanding the challenges with medical data segmentation for privacy
-
E. M. Chan, P. E. Lam, and J. C. Mitchell, "Understanding the challenges with medical data segmentation for privacy," in Proc. USENIX Conf. Safety Security Privacy Interoperability Health Inf. Technol., 2013, p. 2.
-
(2013)
Proc. USENIX Conf. Safety Security Privacy Interoperability Health Inf. Technol
, pp. 2
-
-
Chan, E.M.1
Lam, P.E.2
Mitchell, J.C.3
-
62
-
-
85019042766
-
A secure mechanism for big data collection in large scale Internet of Vehicle
-
Apr
-
L. Guo et al., "A secure mechanism for big data collection in large scale Internet of Vehicle," IEEE Internet Things J., vol. 4, no. 4, pp. 601-610, Apr. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.4
, pp. 601-610
-
-
Guo, L.1
-
63
-
-
84884999092
-
Verified computational differential privacy with applications to smart metering
-
New Orleans, LA, USA
-
G. Barthe, G. Danezis, B. Grégoire, C. Kunz, and S. Zanella-Béguelin, "Verified computational differential privacy with applications to smart metering," in Proc. IEEE Comput. Security Found. Symp., New Orleans, LA, USA, 2013, pp. 287-301.
-
(2013)
Proc. IEEE Comput. Security Found. Symp
, pp. 287-301
-
-
Barthe, G.1
Danezis, G.2
Grégoire, B.3
Kunz, C.4
Zanella-Béguelin, S.5
-
64
-
-
85007524464
-
A multi-cloud based privacypreserving data publishing scheme for the Internet of Things
-
L. Yang, A. Humayed, and F. Li, "A multi-cloud based privacypreserving data publishing scheme for the Internet of Things," in Proc. ACM Conf. Comput. Security Appl., 2016, pp. 30-39.
-
(2016)
Proc. ACM Conf. Comput. Security Appl
, pp. 30-39
-
-
Yang, L.1
Humayed, A.2
Li, F.3
-
65
-
-
85092069836
-
Body area network security: Robust key establishment using human body channel
-
S.-Y. Chang, Y.-C. Hu, H. Anderson, T. Fu, and E. Y. Huang, "Body area network security: Robust key establishment using human body channel," in Proc. USENIX Conf. Health Security Privacy, 2012, p. 5.
-
(2012)
Proc. USENIX Conf. Health Security Privacy
, pp. 5
-
-
Chang, S.-Y.1
Hu, Y.-C.2
Anderson, H.3
Fu, T.4
Huang, E.Y.5
-
66
-
-
85027017308
-
Trust-based service management for social Internet of Things systems
-
Nov./Dec
-
I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for social Internet of Things systems," IEEE Trans. Dependable Secure Comput., vol. 13, no. 6, pp. 684-696, Nov./Dec. 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput
, vol.13
, Issue.6
, pp. 684-696
-
-
Chen, I.-R.1
Bao, F.2
Guo, J.3
-
68
-
-
85048671552
-
-
WeLiveSecurity Oct
-
WeLiveSecurity. (Oct. 2016). 10 Things to Know About the October 21 IoT DDoS Attacks. [Online]. Available: https://www.welivesecurity.com/2016/10/24/10-things-know-october-21-iot-ddos-attacks/
-
(2016)
10 Things to Know about the October 21 IoT DDoS Attacks
-
-
-
69
-
-
84964764354
-
Remote exploitation of an unaltered passenger vehicle
-
Las Vegas, NV, USA
-
C. Miller and C. Valasek, "Remote exploitation of an unaltered passenger vehicle," in Proc. Black Hat USA, Las Vegas, NV, USA, 2015.
-
(2015)
Proc. Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
70
-
-
85008689692
-
Mapping the internet of things
-
A. Wright, "Mapping the Internet of Things," Commun. ACM, vol. 60, no. 1, pp. 16-18, 2016.
-
(2016)
Commun. ACM
, vol.60
, Issue.1
, pp. 16-18
-
-
Wright, A.1
-
71
-
-
84900826011
-
Internet of Things for enterprise systems of modern manufacturing
-
May
-
Z. Bi, L. D. Xu, and C. Wang, "Internet of Things for enterprise systems of modern manufacturing," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1537-1546, May 2014.
-
(2014)
IEEE Trans. Ind. Informat
, vol.10
, Issue.2
, pp. 1537-1546
-
-
Bi, Z.1
Xu, L.D.2
Wang, C.3
-
72
-
-
84947063778
-
-
OWASP. (2014). OWASP Internet of Things Top Ten. [Online]. Available: https://www.owasp.org/images/7/71/InternetofThingsTopTen2014-OWASP.pdf
-
(2014)
OWASP Internet of Things Top Ten
-
-
-
73
-
-
85007039883
-
From physical to cyber: Escalating protection for personalized auto insurance
-
L. Guan et al., "From physical to cyber: Escalating protection for personalized auto insurance," in Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), 2016, pp. 42-55.
-
(2016)
Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. (SenSys)
, pp. 42-55
-
-
Guan, L.1
-
74
-
-
85026209717
-
TrustShadow: Secure execution of unmodified applications with ARM TrustZone
-
L. Guan et al., "TrustShadow: Secure execution of unmodified applications with ARM TrustZone," in Proc. 15th Annu. Int. Conf. Mobile Syst. Appl. Services, 2017, pp. 488-501.
-
(2017)
Proc. 15th Annu. Int. Conf. Mobile Syst. Appl. Services
, pp. 488-501
-
-
Guan, L.1
|