THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 300 |
Dung lượng | 7,81 MB |
Nội dung
Ngày đăng: 14/03/2022, 15:30
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
2. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. J Wirel Pers Commun (Springer) 58(1):49–69. https://doi.org/10.1007/s11277-011-0288-5 | Link | |
3. Miorandi D, Sicari S, Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. J Ad Hoc Netw (Elsevier) 10(7):1497–1516. https://doi.org/10.1016/j.adhoc.2012.02.016 | Link | |
4. Zhang Z et al (2014) IoT security: ongoing challenges and research opportunities. IEEE 7th international conference on service-oriented computing and applications (SOCA), pp 230–234.https://doi.org/10.1109/SOCA.2014.58 | Link | |
6. Shafi Q (2012) Cyber physical systems security: a brief survey. In: 12th international conference on computational science and its applications, pp 146–150.https://doi.org/10.1109/ICCSA.2012.36 | Link | |
7. Kandukuri BR, Ramakrishna Paturi V, Rakshit A (2009) Cloud security issues. In: IEEE inter- national conference on services computing, Bangalore, pp 517–520. https://doi.org/10.1109/SCC.2009.84 | Link | |
8. Aljawarneh SA, Alawneh A, Jaradat R (2017) Cloud security engineering: early stages of SDLC. J Future Gener Comput Syst (Elsevier) 74:385–392. https://doi.org/10.1016/j.future.2016.10.005 | Link | |
9. Vogel B, Gkouskos D (2017) An open architecture approach: towards common design prin- ciples for an IoT architecture. In: Proceedings of the 11th European conference on software architecture: companion proceedings. ACM, pp 85–88. https://doi.org/10.1145/3129790.3129793 | Link | |
12. Jones M, Bradley J, Sakimura N (2015) JSON web token (JWT). RFC 7519. https://doi.org/10.17487/RFC7519 | Link | |
13. International Organization for Standardization (2016) Information technology—message queuing telemetry transport (MQTT) v3.1.1. International Standard ISO/IEC 20922:2016 14. Shelby Z, Hartke K, Bormann C (2014) The constrained application protocol (CoAP). RFC7252 https://doi.org/10.17487/RFC7252 | Link | |
15. Lucas R (2017) DTLS multicast. Internet Draft. https://tools.ietf.org/html/draft-lucas-dtls-multicast-00 | Link | |
18. Chifor B-C, Bica I, Patriciu V-V (2017) Mitigating DoS attacks in publish-subscribe IoT networks. In: 9th international conference on electronics, computers and artificial intelligence (ECAI), pp 1–6. https://doi.org/10.1109/ECAI.2017.8166463 | Link | |
19. Cozzolino V et al (2017) Enabling fine-grained edge offloading for IoT. In: Proceedings of the SIGCOMM posters and demos. ACM, pp 124–126. https://doi.org/10.1145/3123878.313200920. Grieves M (2014) Digital twin: manufacturing excellence through virtual factory replication.Whitepaper | Link | |
26. Chifor B-C, Bica I, Patriciu V-V, Pop F (2018) A security authorization scheme for smart home internet of things devices. J Futur Gener Comput Syst (Elsevier) 86:740–749. https://doi.org/10.1016/j.future.2017.05.048 | Link | |
1. Willemsen B, Mahdi D (2018) Preserve privacy when initiating your IoT strategy. Gartner Report, ID: G00317400 | Khác | |
10. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing.ACM, pp 13–16 | Khác | |
11. Anitta V, Fincy F, Ayyappadas PS (2015) Security aspects in 6 low-pan networks: a study.IOSR J Electron Commun Eng (IOSR-JECE) 8–12 | Khác | |
25. Stajano F (2011) Pico: no more passwords! In: Security protocols 2011: security protocols XIX. Lecture notes in computer science, vol 7114. Springer, pp 49–81 | Khác | |
27. Srinivas S, Kemp J, FIDO Alliance (2017) FIDO UAF architectural overview. FIDO Alliance Proposed Standard | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN