References
- O. Bello & S. Zeadally. (2016). Intelligent device-to-device communication in the internet of things. IEEE Systems Journal, 10(30), 1172-1182. https://doi.org/10.1109/JSYST.2014.2298837
- S. H. Lee & D. W. Lee. (2016). Actual Cases for Smart Fusion Industry based on Internet of Thing. Journal of the Korea Convergence Society, 7(2), 1-6. https://doi.org/10.15207/JKCS.2016.7.2.001
- S. H. Lee, D. H. Shim & D. W. Kee. (2016). Actual Cases of Internet of Thing on Smart City Industry. Journal of Convergence for Information Technology, 6(4), 65-70. https://doi.org/10.22156/CS4SMB.2016.6.4.065
- CISCO, Internet of Things, https://www.cisco.com/c/dam/en/us/products/collateral/e/internet-of-things/at-a-glance-c45-731471.pdf (last access: 2018.07.10.).
- J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang & W. Zhao. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142. https://doi.org/10.1109/JIOT.2017.2683200
- Y. Yang, L. Wu, G. Yin, L. Ki & H. Zhao. (2017). A survey on security and provacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250-1258. https://doi.org/10.1109/JIOT.2017.2694844
- S. Hong & H. J. Sin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, 8(9), 1-7. https://doi.org/10.15207/JKCS.2017.8.9.001
- H. J. Mun, G. H. Choi & Y. C. Hwang. (2016). Countermeasure to Underlying Security Threats in IoT communication. Journal of Convergence for Information Technology, 6(2), 37-44. https://doi.org/10.5121/ijitcs.2016.6104
- C. Kolias, G. Kambourakis, A. Stavrou & J. Voas. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84. https://doi.org/10.1109/MC.2017.201
- J. Gubbi, R. Buyya, S. Marusic & M. Palaniswami. (2013). Internet of Things (IoT): A vision, architecture elements, and future directions. Future generation computer systems, 29(7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
- Symantec. (2018). Internet Security Threat Report, Vol.23.
- NIST. (2016). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, NIST Special Publication 800-160 Volume 1.
- ENISA. (2015). Privacy and Data Protection by Design.
- NISC. (2016). General Framework for Secure IoT Systems.
- KISA. (2016). IoT common security guide for security internalization of ICT convergence products and services, IoT Security Alliance of KISA.
- I. C. Lin & T. C. Liao. (2017). A Survey of Blockchain Security Issues and Challenges, International Journal of Network Security, 19(5), 653-659
- T. Yadav & A. M. Rao. (2015). Technical Aspects of Cyber Kill Chain. International Symosium on Security in Computing and Communication, 438-452.
- Lockheed Martin Cyber KillChain, url: https://www.lockheedmartin.com/en-us/capabilities/cybr/cyber-kill-chain.html (last access: 2018.07.10.).
- CC v3.1 Release 5. Common Criteria for Information Technology Security Evaluation (CC). url: https://www.commoncriteriaportal.org/cc/ (last access: 2018.07.10.).