4.4 Article

An information security analysis method of Internet of things based on balanced double SVM

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTESAE in 5G Scenario

Rajakumar Arul et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis

Norisvaldo Ferraz Junior et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Hardware & Architecture

On Analysis of Lightweight Stream Ciphers with Keyed Update

Orhun Kara et al.

IEEE TRANSACTIONS ON COMPUTERS (2019)

Article Computer Science, Hardware & Architecture

A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications

Samad Rostampour et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Hardware & Architecture

End-to-End Trust and Security for Internet of Things Applications

Sulabh Bhattarai et al.

COMPUTER (2018)

Article Management

A game-theoretic analysis of information security investment for multiple firms in a network

Xiaofei Qian et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2017)

Article Computer Science, Information Systems

A CONCEPTUAL MODEL TO SUPPORT SECURITY ANALYSIS IN THE INTERNET OF THINGS

Orestis Mavropoulos et al.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2017)

Article Business

Integrating wireless sensor networks and the internet: a security analysis

Rodrigo Roman et al.

INTERNET RESEARCH (2009)