Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Scott J. Shackelford (2020), “The Internet of Things: What Everyone Needs to Know®”, Oxford University Press |
Sách, tạp chí |
Tiêu đề: |
The Internet of Things: What Everyone Needs toKnow® |
Tác giả: |
Scott J. Shackelford |
Năm: |
2020 |
|
[2] Sudip Misra, Anandarup Mukherjee, Arijit Roy (2020), “Introduction to IoT” |
Sách, tạp chí |
Tiêu đề: |
Introduction to IoT |
Tác giả: |
Sudip Misra, Anandarup Mukherjee, Arijit Roy |
Năm: |
2020 |
|
[3] J. L. Hernández Ramos, A. Skarmeta (2020), “Security and Privacy in the Internet of Things: Challenges and Solutions” |
Sách, tạp chí |
Tiêu đề: |
Security and Privacy in the Internetof Things: Challenges and Solutions |
Tác giả: |
J. L. Hernández Ramos, A. Skarmeta |
Năm: |
2020 |
|
[4] Ovidiu Vermesan, Peter Friess, IoT al. (2009), “Internet of Things Strategic Research Roadmap”, 44pp, European Research Cluster on the Internet of Things (IERC) |
Sách, tạp chí |
Tiêu đề: |
Internet of Things StrategicResearch Roadmap |
Tác giả: |
Ovidiu Vermesan, Peter Friess, IoT al |
Năm: |
2009 |
|
[5] L. Atzori, A. Iera, and G. Morabito, (2010), “The Internet of Things: A survey”Computer Networks, vol. 54, no.15 |
Sách, tạp chí |
Tiêu đề: |
The Internet of Things: A survey |
Tác giả: |
L. Atzori, A. Iera, and G. Morabito |
Năm: |
2010 |
|
[6] Jennifer Duffourg (2016), “Symantec Research Finds IoT Devices Increasingly Used to Carry IoT DDoS Attacks”, The Business Wire Electronical Newspapers, Symantec Corporation |
Sách, tạp chí |
Tiêu đề: |
Symantec Research Finds IoT Devices IncreasinglyUsed to Carry IoT DDoS Attacks |
Tác giả: |
Jennifer Duffourg |
Năm: |
2016 |
|
[7] Lopez, (2013), “An introduction to the internet of things (IoT): Part 1 of "The IoT series" Research LLC”, p. 2 |
Sách, tạp chí |
Tiêu đề: |
An introduction to the internet of things (IoT): Part 1 of "The IoTseries" Research LLC |
Tác giả: |
Lopez |
Năm: |
2013 |
|
[8] Daniel Browning (2019), “The Industrial Internet of Things and the Global Power Industry”, Power Electronical Newspapers |
Sách, tạp chí |
Tiêu đề: |
The Industrial Internet of Things and the Global PowerIndustry |
Tác giả: |
Daniel Browning |
Năm: |
2019 |
|
[9] Xue Yang, Zhihua Li, Zhenmin Geng, Haitao Zhang (2012), “A Multilayer Security Model for Internet of Things”, Communications in Computer and Information Science, 2012, volume 312, p 388-393 |
Sách, tạp chí |
Tiêu đề: |
A Multilayer SecurityModel for Internet of Things |
Tác giả: |
Xue Yang, Zhihua Li, Zhenmin Geng, Haitao Zhang |
Năm: |
2012 |
|
[10] A Ramesh, A. Suruliandi (2013), “Performance Analysis of Encryption for Information Security”, IEEE Publishing |
Sách, tạp chí |
Tiêu đề: |
Performance Analysis of Encryption forInformation Security |
Tác giả: |
A Ramesh, A. Suruliandi |
Năm: |
2013 |
|
[11] J. Yashaswini (2017), “A Review on IoT Security Issues and Countermeasures”, Orient Journal Computer Science and Technology |
Sách, tạp chí |
Tiêu đề: |
A Review on IoT Security Issues and Countermeasures |
Tác giả: |
J. Yashaswini |
Năm: |
2017 |
|
[12] N. Kushalnagar, G. Montenegro, C. Schumacher (2007), “IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement”, Goals, RFC 4919 |
Sách, tạp chí |
Tiêu đề: |
IPv6 over LowPowerWireless Personal Area Networks (6LoWPANs): Overview, Assumptions, ProblemStatement |
Tác giả: |
N. Kushalnagar, G. Montenegro, C. Schumacher |
Năm: |
2007 |
|
[13] Rolf H.Weber (2010), “Internet of things – new security and privacy challenges”Computer Law & Security Review, vol. 26, pp. 23-30 |
Sách, tạp chí |
Tiêu đề: |
Internet of things – new security and privacy challenges |
Tác giả: |
Rolf H.Weber |
Năm: |
2010 |
|
[14] Jurgen Schonwalder (2010), “Internet of Things: 802.15.4, 6LoWPAN, RPL, COAP”, Jacob University |
Sách, tạp chí |
Tiêu đề: |
Internet of Things: 802.15.4, 6LoWPAN, RPL,COAP |
Tác giả: |
Jurgen Schonwalder |
Năm: |
2010 |
|
[15] Carsten Bormann (2009), “6LoWPAN and CoRE: How to get the next billion nodes on the net and into the web”, Bremen University |
Sách, tạp chí |
Tiêu đề: |
6LoWPAN and CoRE: How to get the next billion nodeson the net and into the web |
Tác giả: |
Carsten Bormann |
Năm: |
2009 |
|
[16] P Biswas, Y. Ye (2004), “Semidefinite programming for ad hoc wireless sensor network localization”, IEEE Conference on Information Processing in Sensor Networks, p.46 - 54 |
Sách, tạp chí |
Tiêu đề: |
Semidefinite programming for ad hoc wireless sensornetwork localization |
Tác giả: |
P Biswas, Y. Ye |
Năm: |
2004 |
|
[17] C. Xiangqian, K. Makki, K. Yen, and N. Pissinou (2009), “Sensor network security:A survey ”, IEEE Commun Surveys, vol. 11, no. 2, pp. 52–73 |
Sách, tạp chí |
Tiêu đề: |
Sensor network security:"A survey |
Tác giả: |
C. Xiangqian, K. Makki, K. Yen, and N. Pissinou |
Năm: |
2009 |
|
[18] Pereira, F., Correia, R., Pinho, P., Lopes, S. I., & Carvalho, N. B. (2020),“Challenges in Resource-Constrained IoT Devices: Energy and Communication as Critical Success Factors for Future IoT Deployment”. Sensors (Basel, Switzerland), 20(22), 6420. Doi: 10.3390/s20226420 |
Sách, tạp chí |
Tiêu đề: |
Challenges in Resource-Constrained IoT Devices: Energy and Communication asCritical Success Factors for Future IoT Deployment |
Tác giả: |
Pereira, F., Correia, R., Pinho, P., Lopes, S. I., & Carvalho, N. B |
Năm: |
2020 |
|
[19] V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker, (2021), "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities" in IEEE Access, vol. 9, pp. 28177-28193, 2021, doi:10.1109/ACCESS.2021.3052867 |
Sách, tạp chí |
Tiêu đề: |
LightweightCryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparisonand Research Opportunities |
Tác giả: |
V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker |
Năm: |
2021 |
|
[20] C. Bormann, M. Ersue and A. Keranen, (2014), “Terminology for Constrained Node Networks” https://tools.ietf.org/html/rfc7228 |
Sách, tạp chí |
Tiêu đề: |
Terminology for ConstrainedNode Networks |
Tác giả: |
C. Bormann, M. Ersue and A. Keranen |
Năm: |
2014 |
|