References
- Somia Sahraoui and Azeddine Bilami, "Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things," in Proc. of IoT'16 Proceedings of the 6th International Conference on the Internet of Things, pp.131-139, November 07-09, 2016.
- Meesun Kim, Hyun Ahn and Kwanghoon Pio Kim, "Process-Aware Internet of Things: A Conceptual Extension of the Internet of Things Framework and Architecture," KSII Transactions on Internet and Information Systems, vol. 10, no. 8, August 31, 2016.
- Vu-Anh-Quang Nguyen, "Study on realtime control system in IoT based smart factory: Interference awareness, architectural elements, and its application," in Proc. of Information Science and Technology (ICIST), 2017 Seventh International Conference on, April 16-19, 2017.
- H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi, M. Shafie-khah and P. Siano, "Iot-based Smart Cities: a Survey," in Proc. of Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, June 7-10, 2016.
- Jorge Alfonso, Nuria Sanchez, Jose Manuel Menendez and Emilio Cacheiro, "Cooperative ITS communications architecture: the FOTsis project approach and beyond," IET Intelligent Transport System, vol. 9, issue. 6, pp.591-598, August 06, 2015. https://doi.org/10.1049/iet-its.2014.0205
- Elisa Bertino, Nayeem Islam, "Botnets and Internet of Things Security," Computer, vol. 50, issue. 2, pp. 76-79, 2017. https://doi.org/10.1109/MC.2017.62
- James A. Jerkins, "Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code," in Proc. of Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual, January 09-11, 2017.
- OWASP, "IoT Vulnerabilities Project,"
- Ryan Williams, Emma McMahon, Sagar Samtani, Mark Patton and Hsinchun Chen, "Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach," in Proc. of Intelligence and Security Informatics (ISI), 2017 IEEE International Conference on, July 2017
- Korea Internet & Security Agency, "SW New Vulnerability Reporting Award Status and Key Vulnerabilities," March 27, 2017.
- National Institute of Standard and Technology, "Guide to General Server Security," Special Publication, 800-123, July 25, 2008.
- Information Security Office, "Red Hat Enterprice Linux 7 Hardening Checklist," The University of Texas at Austin,
- Korea Internet & Security Agency, "Guide to Using Cryptography Authentication Technology in Internet (IoT) Environment," April, 2016.
- OWASP, "IoT Logging Events,"
- Thuy T.T. Nguyen and Grenville Armitage, "A survey of techniques for Internet traffic classification using machine learning," IEEE Communications Surveys and Tutorials, vol. 10, issue 4, pp. 56-76, November, 2008. https://doi.org/10.1109/SURV.2008.080406
Cited by
- Current research on Internet of Things (IoT) security: A survey vol.148, pp.None, 2018, https://doi.org/10.1016/j.comnet.2018.11.025
- Interpretive Structural Modeling in the Adoption of IoT Services vol.13, pp.3, 2019, https://doi.org/10.3837/tiis.2019.03.004
- STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme vol.29, pp.3, 2018, https://doi.org/10.13089/jkiisc.2019.29.3.599
- Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning vol.7, pp.None, 2018, https://doi.org/10.7717/peerj-cs.350