[1]
|
A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products
Sensors,
2023
DOI:10.3390/s23063236
|
|
|
[2]
|
A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
Materials Today: Proceedings,
2023
DOI:10.1016/j.matpr.2021.03.417
|
|
|
[3]
|
Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
Journal of Experimental & Theoretical Artificial Intelligence,
2023
DOI:10.1080/0952813X.2021.1970824
|
|
|
[4]
|
Mutual combination of selected principles and technologies of Industry 4.0 and quality management methods - case study
Quality Engineering,
2023
DOI:10.1080/08982112.2023.2193895
|
|
|
[5]
|
The Hardware-Based User Authentication Method for Personal Emergency Rescue Systems
2023 International Russian Automation Conference (RusAutoCon),
2023
DOI:10.1109/RusAutoCon58002.2023.10272815
|
|
|
[6]
|
Evolution of Internet of Things From Blockchain to IOTA: A Survey
IEEE Access,
2022
DOI:10.1109/ACCESS.2021.3138353
|
|
|
[7]
|
A Novel Bi-Key Computational Algorithm for Secure Data Transmission
in Smart Meter Environment
Recent Advances in Computer Science and Communications,
2022
DOI:10.2174/2666255813666201207153825
|
|
|
[8]
|
Pet Feeder using IOT
Advances in Intelligent Systems and Technologies,
2022
DOI:10.53759/aist/978-9914-9946-1-2_6
|
|
|
[9]
|
Evolution of Internet of Things From Blockchain to IOTA: A Survey
IEEE Access,
2022
DOI:10.1109/ACCESS.2021.3138353
|
|
|
[10]
|
Transforming Management with AI, Big-Data, and IoT
2022
DOI:10.1007/978-3-030-86749-2_9
|
|
|
[11]
|
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets
Sensors,
2022
DOI:10.3390/s22103744
|
|
|
[12]
|
Proactive Detection of Attacks on APCS Accounts Based on Analysis of User Identification Graphical Attributes
2022 International Russian Automation Conference (RusAutoCon),
2022
DOI:10.1109/RusAutoCon54946.2022.9896378
|
|
|
[13]
|
Challenges and Opportunities for Deep Learning Applications in Industry 4.0
2022
DOI:10.2174/9789815036060122010004
|
|
|
[14]
|
A geographic routing protocol based on trunk line in VANETs
Digital Communications and Networks,
2021
DOI:10.1016/j.dcan.2021.03.001
|
|
|
[15]
|
Research on Battery Monitoring Technology Based on Internet of Things
2021 International Conference on Signal Processing and Machine Learning (CONF-SPML),
2021
DOI:10.1109/CONF-SPML54095.2021.00037
|
|
|
[16]
|
A Review on the Security of the Internet of Things: Challenges and Solutions
Wireless Personal Communications,
2021
DOI:10.1007/s11277-021-08348-9
|
|
|
[17]
|
A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
Materials Today: Proceedings,
2021
DOI:10.1016/j.matpr.2021.03.417
|
|
|
[18]
|
Role and applications of IoT in materials and manufacturing industries – Review
Materials Today: Proceedings,
2021
DOI:10.1016/j.matpr.2020.11.939
|
|
|
[19]
|
Formation of a Digital Footprint Based on the Characteristics of Computer Hardware to Identity APCS Users
2021 International Russian Automation Conference (RusAutoCon),
2021
DOI:10.1109/RusAutoCon52004.2021.9537361
|
|
|
[20]
|
Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
Journal of Experimental & Theoretical Artificial Intelligence,
2021
DOI:10.1080/0952813X.2021.1970824
|
|
|
[21]
|
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
Sensors,
2021
DOI:10.3390/s21196647
|
|
|
[22]
|
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
Digital Communications and Networks,
2021
DOI:10.1016/j.dcan.2020.09.001
|
|
|
[23]
|
The Ethics of Psychological Artificial Intelligence: Clinical Considerations
Counseling and Values,
2021
DOI:10.1002/cvj.12153
|
|
|
[24]
|
Digital Twin (DT) in Smart Energy Systems - Systematic Literature Review of DT as a growing solution for Energy Internet of the Things (EIoT)
E3S Web of Conferences,
2021
DOI:10.1051/e3sconf/202131209002
|
|
|
[25]
|
Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI),
2021
DOI:10.1109/SWC50871.2021.00062
|
|
|
[26]
|
Emerging Pyroelectric Nanogenerators to Convert Thermal Energy into Electrical Energy
Small,
2021
DOI:10.1002/smll.201903469
|
|
|
[27]
|
Machine Learning and Knowledge Discovery in Databases
Communications in Computer and Information Science,
2020
DOI:10.1007/978-3-030-43823-4_52
|
|
|
[28]
|
Characteristics and Challenges of the Internet of Things in Entrepreneurship
Rural Sustainability Research,
2020
DOI:10.2478/plua-2020-0004
|
|
|
[29]
|
Characteristics and Challenges of the Internet of Things in Entrepreneurship
Rural Sustainability Research,
2020
DOI:10.2478/plua-2020-0004
|
|
|
[30]
|
IoT Soil Moisture Monitoring and Irrigation System Development
Proceedings of the 2020 9th International Conference on Software and Computer Applications,
2020
DOI:10.1145/3384544.3384595
|
|
|
[31]
|
Fundamentals of IoT and Wearable Technology Design
2020
DOI:10.1002/9781119617570.ch3
|
|
|
[32]
|
Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3022661
|
|
|
[33]
|
Cooja Based Approach for Estimation and Enhancement of Lifetime of 6LoWPAN Environment
International Journal of Sensors, Wireless Communications and Control,
2020
DOI:10.2174/2210327909666190409124604
|
|
|
[34]
|
Fundamentals of IoT and Wearable Technology Design
2020
DOI:10.1002/9781119617570.ch3
|
|
|
[35]
|
Internet of Things (IoT)
2020
DOI:10.1007/978-3-030-37468-6_11
|
|
|
[36]
|
IoT Soil Moisture Monitoring and Irrigation System Development
Proceedings of the 2020 9th International Conference on Software and Computer Applications,
2020
DOI:10.1145/3384544.3384595
|
|
|
[37]
|
Characteristics and Challenges of the Internet of Things in Entrepreneurship
Rural Sustainability Research,
2020
DOI:10.2478/plua-2020-0004
|
|
|
[38]
|
Resilience for Smart Water Systems
Journal of Water Resources Planning and Management,
2020
DOI:10.1061/(ASCE)WR.1943-5452.0001130
|
|
|
[39]
|
Towards the Internet of Things
EAI/Springer Innovations in Communication and Computing,
2020
DOI:10.1007/978-3-030-18468-1_2
|
|
|
[40]
|
Advanced Computing and Systems for Security
Advances in Intelligent Systems and Computing,
2020
DOI:10.1007/978-981-13-8969-6_1
|
|
|
[41]
|
Cyberentity and its consistency in the cyber-physical-social-thinking hyperspace
Computers & Electrical Engineering,
2020
DOI:10.1016/j.compeleceng.2019.106506
|
|
|
[42]
|
A Survey on Architecture, Protocols and Challenges in IoT
Wireless Personal Communications,
2020
DOI:10.1007/s11277-020-07108-5
|
|
|
[43]
|
Machine Learning and Knowledge Discovery in Databases
Communications in Computer and Information Science,
2020
DOI:10.1007/978-3-030-43823-4_52
|
|
|
[44]
|
A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories
IEEE Transactions on Emerging Topics in Computing,
2020
DOI:10.1109/TETC.2017.2671846
|
|
|
[45]
|
Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm
Intelligent Systems Reference Library,
2020
DOI:10.1007/978-3-030-33596-0_1
|
|
|
[46]
|
A Survey of Voice Pathology Surveillance Systems Based on Internet of Things and Machine Learning Algorithms
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.2984925
|
|
|
[47]
|
A Privacy Aware Architecture for IoT Enabled Systems
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2019
DOI:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00073
|
|
|
[48]
|
Emerging Pyroelectric Nanogenerators to Convert Thermal Energy into Electrical Energy
Small,
2019
DOI:10.1002/smll.201903469
|
|
|
[49]
|
Access Control for Physical Objects in Internet of Things
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2019
DOI:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00077
|
|
|
[50]
|
Energy Efficient Service Embedding In IoT over PON
2019 21st International Conference on Transparent Optical Networks (ICTON),
2019
DOI:10.1109/ICTON.2019.8840429
|
|
|
[51]
|
Low-Power AES Data Encryption Architecture for a LoRaWAN
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2941972
|
|
|
[52]
|
CATSWoTS: Context Aware Trustworthy Social Web of Things System
Sensors,
2019
DOI:10.3390/s19143076
|
|
|
[53]
|
An approach to develop the smart health using Internet of Things and authentication based on biometric technology
Future Generation Computer Systems,
2019
DOI:10.1016/j.future.2018.09.024
|
|
|
[54]
|
Recent Trends in Data Science and Soft Computing
Advances in Intelligent Systems and Computing,
2019
DOI:10.1007/978-3-319-99007-1_38
|
|
|
[55]
|
Hybrid Energy Harvesters: Toward Sustainable Energy Harvesting
Advanced Materials,
2019
DOI:10.1002/adma.201802898
|
|
|
[56]
|
Dynamic Programming for Impulse Feedback and Fast Controls
Lecture Notes in Control and Information Sciences,
2019
DOI:10.1007/978-3-030-16184-2_14
|
|
|
[57]
|
COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
Sensors,
2019
DOI:10.3390/s19071492
|
|
|
[58]
|
10th International Conference on Robotics, Vision, Signal Processing and Power Applications
Lecture Notes in Electrical Engineering,
2019
DOI:10.1007/978-981-13-6447-1_61
|
|
|
[59]
|
Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
Enterprise Information Systems,
2019
DOI:10.1080/17517575.2019.1600041
|
|
|
[60]
|
Intrusion detection systems in the Internet of things: A comprehensive investigation
Computer Networks,
2019
DOI:10.1016/j.comnet.2019.05.014
|
|
|
[61]
|
Potential Development of AES 128-bit Key Generation for LoRaWAN Security
2019 2nd International Conference on Communication Engineering and Technology (ICCET),
2019
DOI:10.1109/ICCET.2019.8726884
|
|
|
[62]
|
Computer network security technology based on artificial intelligence
Journal of Intelligent & Fuzzy Systems,
2019
DOI:10.3233/JIFS-179184
|
|
|
[63]
|
Key Technology for Intelligent Interaction Based on Internet of Things
International Journal of Distributed Systems and Technologies,
2019
DOI:10.4018/IJDST.2019010103
|
|
|
[64]
|
Security, Privacy and Trust in the IoT Environment
2019
DOI:10.1007/978-3-030-18075-1_1
|
|
|
[65]
|
Hybrid Energy Harvesters: Toward Sustainable Energy Harvesting
Advanced Materials,
2019
DOI:10.1002/adma.201802898
|
|
|
[66]
|
Web Services – ICWS 2018
Lecture Notes in Computer Science,
2018
DOI:10.1007/978-3-319-94289-6_4
|
|
|
[67]
|
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
2018 Fifth International Conference on Internet of Things: Systems, Management and Security,
2018
DOI:10.1109/IoTSMS.2018.8554432
|
|
|
[68]
|
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
IEEE Access,
2018
DOI:10.1109/ACCESS.2018.2852563
|
|
|
[69]
|
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
SoutheastCon 2018,
2018
DOI:10.1109/SECON.2018.8479128
|
|
|
[70]
|
Trust management for SOA based social WoT system
2018 20th International Conference on Advanced Communication Technology (ICACT),
2018
DOI:10.23919/ICACT.2018.8323768
|
|
|
[71]
|
Modified and Improved IPv6 Header Compression (MIHC) Scheme for 6LoWPAN
Wireless Personal Communications,
2018
DOI:10.1007/s11277-018-5894-z
|
|
|
[72]
|
Literature review of Industry 4.0 and related technologies
Journal of Intelligent Manufacturing,
2018
DOI:10.1007/s10845-018-1433-8
|
|
|
[73]
|
Advances in Service-Oriented and Cloud Computing
Communications in Computer and Information Science,
2018
DOI:10.1007/978-3-319-72125-5_5
|
|
|
[74]
|
Implementation of Cyber-Physical Production Systems for Quality Prediction and Operation Control in Metal Casting
Sensors,
2018
DOI:10.3390/s18051428
|
|
|
[75]
|
Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking
IEEE Internet of Things Journal,
2018
DOI:10.1109/JIOT.2018.2846040
|
|
|
[76]
|
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017
Advances in Intelligent Systems and Computing,
2018
DOI:10.1007/978-3-319-64861-3_75
|
|
|
[77]
|
Examining Cloud Computing Technologies Through the Internet of Things
Advances in Wireless Technologies and Telecommunication,
2018
DOI:10.4018/978-1-5225-3445-7.ch005
|
|
|
[78]
|
Information and Communication Technology for Sustainable Development
Lecture Notes in Networks and Systems,
2018
DOI:10.1007/978-981-10-3932-4_1
|
|
|
[79]
|
A Flexible Wildcard-Pattern Matching Accelerator via Simultaneous Discrete Finite Automata
IEEE Transactions on Very Large Scale Integration (VLSI) Systems,
2017
DOI:10.1109/TVLSI.2017.2671408
|
|
|
[80]
|
A novel bagging C4.5 algorithm based on wrapper feature selection for supporting wise clinical decision making
Journal of Biomedical Informatics,
2017
DOI:10.1016/j.jbi.2017.11.005
|
|
|
[81]
|
A review of the smart world
Future Generation Computer Systems,
2017
DOI:10.1016/j.future.2017.09.010
|
|
|
[82]
|
A light weight and secure video conferencing scheme utilizing public network
Multimedia Tools and Applications,
2017
DOI:10.1007/s11042-016-3973-2
|
|
|
[83]
|
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
Future Generation Computer Systems,
2017
DOI:10.1016/j.future.2017.03.001
|
|
|
[84]
|
Fog for 5G and IoT
2017
DOI:10.1002/9781119187202.ch11
|
|
|
[85]
|
Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communication
2017 International Conference on Computing, Networking and Communications (ICNC),
2017
DOI:10.1109/ICCNC.2017.7876208
|
|
|
[86]
|
Internet of things security
2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS),
2017
DOI:10.1109/WITS.2017.7934655
|
|
|
[87]
|
Dynamic network configuration in the Internet of Things
2017 5th International Symposium on Digital Forensic and Security (ISDFS),
2017
DOI:10.1109/ISDFS.2017.7916503
|
|
|
[88]
|
Swarm Intelligence via the Internet of Things and the Phenomenological Turn
Philosophies,
2017
DOI:10.3390/philosophies2030019
|
|
|
[89]
|
The Internet of Things
2017
DOI:10.4018/978-1-5225-1832-7.ch011
|
|
|
[90]
|
A review on security problems and measures of Internet of Things
2017 International Conference on Intelligent Computing and Control Systems (ICICCS),
2017
DOI:10.1109/ICCONS.2017.8250560
|
|
|
[91]
|
A study of the Internet of Things in the oil and gas industry
2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI),
2017
DOI:10.1109/KBEI.2017.8324979
|
|
|
[92]
|
System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems
ACM Transactions on Embedded Computing Systems,
2017
DOI:10.1145/2925991
|
|
|
[93]
|
System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems
ACM Transactions on Embedded Computing Systems,
2017
DOI:10.1145/2925991
|
|
|
[94]
|
Evolving authentication design considerations for the internet of biometric things (IoBT)
Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis,
2016
DOI:10.1145/2968456.2973748
|
|
|
[95]
|
AN IOT BASED MOTION
DETECTION USING RASPBERRY PI
i-manager’s Journal on Cloud Computing,
2016
DOI:10.26634/jcc.3.4.13594
|
|
|
[96]
|
Evolving authentication design considerations for the internet of biometric things (IoBT)
Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis - CODES '16,
2016
DOI:10.1145/2968456.2973748
|
|
|
[97]
|
New Approaches in Intelligent Control
Intelligent Systems Reference Library,
2016
DOI:10.1007/978-3-319-32168-4_4
|
|
|
[98]
|
A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud),
2016
DOI:10.1109/CSCloud.2016.37
|
|
|
[99]
|
Pick a right puppy from a litter, toward a secure controller framework in physical, human and cyber triad
2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference,
2016
DOI:10.1109/ITNEC.2016.7560327
|
|
|
[100]
|
A survey on Internet of Things architectures
Journal of King Saud University - Computer and Information Sciences,
2016
DOI:10.1016/j.jksuci.2016.10.003
|
|
|
[101]
|
A survey: Cyber-physical-social systems and their system-level design methodology
Future Generation Computer Systems,
2016
DOI:10.1016/j.future.2016.06.034
|
|
|
[102]
|
A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft
Journal of Network and Computer Applications,
2016
DOI:10.1016/j.jnca.2015.06.021
|
|
|
[103]
|
Secure IoT framework and 2D architecture for End-To-End security
The Journal of Supercomputing,
2016
DOI:10.1007/s11227-016-1684-0
|
|
|
[104]
|
Survey of Real-time Processing Technologies of IoT Data Streams
Journal of Information Processing,
2016
DOI:10.2197/ipsjjip.24.195
|
|
|
[105]
|
Research Studies on the Agricultural and Commercial Field
2015 IIAI 4th International Congress on Advanced Applied Informatics,
2015
DOI:10.1109/IIAI-AAI.2015.291
|
|
|
[106]
|
FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things
2015 IEEE International Conference on Services Computing,
2015
DOI:10.1109/SCC.2015.46
|
|
|
[107]
|
Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Advances in Digital Crime, Forensics, and Cyber Terrorism,
2015
DOI:10.4018/978-1-4666-6324-4.ch026
|
|
|
[108]
|
Securing the Internet of Things with Responsive Artificial Immune Systems
Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation,
2015
DOI:10.1145/2739480.2754816
|
|
|
[109]
|
Securing the Internet of Things with Responsive Artificial Immune Systems
Proceedings of the 2015 on Genetic and Evolutionary Computation Conference - GECCO '15,
2015
DOI:10.1145/2739480.2754816
|
|
|
[110]
|
A security communication model based on certificateless online/offline signcryption for Internet of Things
Security and Communication Networks,
2014
DOI:10.1002/sec.836
|
|
|
[111]
|
An Anthology of Theories and Models of Design
2014
DOI:10.1007/978-1-4471-6338-1_5
|
|
|
[112]
|
Future Internet of Things: open issues and challenges
Wireless Networks,
2014
DOI:10.1007/s11276-014-0731-0
|
|
|
[113]
|
IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System
2014 IIAI 3rd International Conference on Advanced Applied Informatics,
2014
DOI:10.1109/IIAI-AAI.2014.47
|
|
|
[114]
|
A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system
2014 IEEE Computers, Communications and IT Applications Conference,
2014
DOI:10.1109/ComComAp.2014.7017202
|
|
|
[115]
|
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints
2014 IEEE Computers, Communications and IT Applications Conference,
2014
DOI:10.1109/ComComAp.2014.7017179
|
|
|
[116]
|
Design of Complex Event-Processing IDS in Internet of Things
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation,
2014
DOI:10.1109/ICMTMA.2014.57
|
|
|
[117]
|
Big data application to the vegetable production and distribution system
2014 IEEE 10th International Colloquium on Signal Processing and its Applications,
2014
DOI:10.1109/CSPA.2014.6805713
|
|
|
[118]
|
An Anthology of Theories and Models of Design
2014
DOI:10.1007/978-1-4471-6338-1_5
|
|
|
[119]
|
Research on Intelligent Regulation of Ship-to-Ship Crude Oil Transfer at Sea Based on Internet of Things
Advanced Materials Research,
2013
DOI:10.4028/www.scientific.net/AMR.860-863.2954
|
|
|
[120]
|
The Regulation of Ship-to-Ship Crude Oil Transfer at Sea: Is There A Need for an Intelligent Monitoring System?
Journal of Applied Sciences,
2013
DOI:10.3923/jas.2013.2062.2066
|
|
|
[121]
|
On the features and challenges of security and privacy in distributed internet of things
Computer Networks,
2013
DOI:10.1016/j.comnet.2012.12.018
|
|
|
[122]
|
Unit and Ubiquitous Internet of Things
2013
DOI:10.1201/b14742-10
|
|
|
[123]
|
A security communication model based on certificateless online/offline signcryption for Internet of Things
Security and Communication Networks,
2013
DOI:10.1002/sec.836
|
|
|
[124]
|
The Study and Application of the IoT in Pet Systems
Advances in Internet of Things,
2013
DOI:10.4236/ait.2013.31001
|
|
|
[125]
|
A Survey on the Internet of Things Security
2013 Ninth International Conference on Computational Intelligence and Security,
2013
DOI:10.1109/CIS.2013.145
|
|
|
[126]
|
A Network Storage Framework for Internet of Things
Procedia Computer Science,
2013
DOI:10.1016/j.procs.2013.06.161
|
|
|