Tài liệu tham khảo |
Loại |
Chi tiết |
[1] D. Evans, ‘The internet of things: How the next evolution of the internet is changing everything’, CISCO White Pap., vol. 1, no. 2011, pp. 1–11, 2011 |
Sách, tạp chí |
|
[2] K. Angrishi, ‘Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets’, ArXiv Prepr. ArXiv170203681, 2017 |
Sách, tạp chí |
Tiêu đề: |
ArXiv Prepr. ArXiv170203681 |
|
[4] Kaspersky Lab report, ‘Honeypots and the Internet of Things’, Securelist - Kaspersky Lab’s cyberthreat research and reports, 2017.https://securelist.com/honeypots-and-the-internet-of-things/78751/ (accessed May 11, 2018) |
Sách, tạp chí |
Tiêu đề: |
Securelist - Kaspersky Lab’s cyberthreat research and reports |
|
[5] K. Moskvitch, ‘Securing IoT: In your smart home and your connected enterprise’, Eng. Technol., vol. 12, no. 3, pp. 40–42, 2017 |
Sách, tạp chí |
|
[6] V. Woods and R. Van der Meulen, ‘Gartner Says Worldwide loT Security Spending to Reach $348 Million in 2016’, in Gartner, Stamford, 2016 |
Sách, tạp chí |
Tiêu đề: |
Gartner, Stamford |
|
[8] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, ‘DDoS in the IoT: Mirai and Other Botnets’, Computer, vol. 50, no. 7, pp. 80–84, 2017, doi:10.1109/MC.2017.201 |
Sách, tạp chí |
|
[9] C. Lévy-Bencheton, E. Darra, G. Tétu, G. Dufay, and M. Alattar, ‘Security and resilience of smart home environments good practices and recommendations’, Eur. Union Agency Netw. Inf. Secur. ENISA Heraklion Greece, 2015 |
Sách, tạp chí |
Tiêu đề: |
Eur. Union Agency Netw. Inf. Secur. ENISA Heraklion Greece |
|
[10] Kaspersky Lab report, ‘IoT: a malware story’, Securelist - Kaspersky Lab’s cyberthreat research and reports. https://securelist.com/iot-a-malware-story/94451/ (accessed Dec. 19, 2019) |
Sách, tạp chí |
Tiêu đề: |
Securelist - Kaspersky Lab’s cyberthreat research and reports |
|
[11] K. Ashton, ‘That “internet of things” thing’, RFID J., vol. 22, no. 7, pp. 97–114, 2009 |
Sách, tạp chí |
Tiêu đề: |
internet of things” thing’," RFID J |
|
[12] S. Madakam, V. Lake, V. Lake, and V. Lake, ‘Internet of Things (IoT): A literature review’, J. Comput. Commun., vol. 3, no. 05, p. 164, 2015 |
Sách, tạp chí |
Tiêu đề: |
J. Comput. Commun |
|
[15] K. Chen et al., ‘Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice’, J. Hardw. Syst. Secur., vol. 2, no. 2, pp. 97–110, 2018 |
Sách, tạp chí |
Tiêu đề: |
et al.", ‘Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice’," J. Hardw. Syst. Secur |
|
[16] S. Prentice, ‘The five SMART technologies to Watch’, Gart. Conn., vol.21, 2014 |
Sách, tạp chí |
|
[19] S. Dange and M. Chatterjee, ‘IoT Botnet: The Largest Threat to the IoT Network’, in Data Communication and Networks, Springer, 2020, pp. 137–157 |
Sách, tạp chí |
Tiêu đề: |
Data Communication and Networks |
|
[24] Andrei Costin, Jonas Zaddach, Aur´elien Francillon, and Davide Balzarotti,‘A Large-Scale Analysis of the Security of Embedded Firmwares’, EURECOM Sophia-Antipolis Biot Fr., 2014 |
Sách, tạp chí |
Tiêu đề: |
EURECOM Sophia-Antipolis Biot Fr |
|
[25] Brian Krebs, ‘Source Code for IoT Botnet “Mirai” released’.Krebsonsecurity.com, Sep. 30, 2016. [Online]. Available:https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/ |
Sách, tạp chí |
|
[28] E. Bertino and N. Islam, ‘Botnets and Internet of Things Security’,Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017, doi: 10.1109/MC.2017.62 |
Sách, tạp chí |
|
[29] P. Beltrán-García, E. Aguirre-Anaya, P. J. Escamilla-Ambrosio, and R.Acosta-Bermejo, ‘IoT Botnets’, in Telematics and Computing, Cham, 2019, pp. 247–257 |
Sách, tạp chí |
Tiêu đề: |
Telematics and Computing |
|
[14] ‘State of the IoT 2018: Number of IoT devices now at 7B – Marketaccelerating’. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/ (accessed Jan. 06, 2021) |
Link |
|
[20] S. Lyndon, J. H. Timothy, and A. Michelle, ‘The weaponization of IoT devices: Rise of the thingbots’, IBM Managed Security Services Threat Research group, Apr. 2017. [Online]. Available:https://www.ibm.com/downloads/cas/6MLEALKV |
Link |
|
[27] J. Gamblin, ‘The malware Mirai Source Code’. Jan. 07, 2021. Accessed:Jan. 08, 2021. [Online]. Available: https://github.com/jgamblin/Mirai-Source-Code |
Link |
|