4.6 Article

IoT Privacy and Security: Challenges and Solutions

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Theory & Methods

Authorization Model for IoT Healthcare Systems: Case Study

Mais Tawalbeh et al.

2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) (2020)

Article Computer Science, Hardware & Architecture

Current research on Internet of Things (IoT) security: A survey

Mardiana Binti Mohamad Noor et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Anatomy of Threats to the Internet of Things

Imran Makhdoom et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

Amandeep Singh Sohal et al.

COMPUTERS & SECURITY (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Editorial Material Computer Science, Theory & Methods

Internet of Things security and forensics: Challenges and opportunities

Mauro Conti et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

SECURING CONSUMER IOT IN THE SMART HOME: ARCHITECTURE, CHALLENGES, AND COUNTERMEASURES

Yan Meng et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Review Computer Science, Hardware & Architecture

Internet of Things security: A survey

Fadele Ayotunde Alaba et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

A Security Framework for the Internet of Things in the Future Internet Architecture

Xiruo Liu et al.

FUTURE INTERNET (2017)

Review Computer Science, Information Systems

Internet of Things: Architectures, Protocols, and Applications

Pallavi Sethi et al.

JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2017)

Article Computer Science, Information Systems

A Survey of Man In The Middle Attacks

Mauro Conti et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

Twenty Security Considerations for Cloud-Supported Internet of Things

Jatinder Singh et al.

IEEE INTERNET OF THINGS JOURNAL (2016)