References
- L. Hang & D. Kim. (2019). Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors, 19(10), 2228. doi:10.3390/s19102228
- C. Z. IZhang. (n.d.). Economics of Internet of Things (IoT): Market structure analysis. Managing the Internet of Things: Architectures, Theories and Applications, 137-154. doi:10.1049/pbte067e_ch8
- J. Freer, B. Beggs, H. Fernandez-Canque, F. Chevrier & A Goryashko. (1995.). Moving object surveillance and analysis for camera based security systems. Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology. (pp. 67-71). doi:10.1109/ccst.1995.524735
- Root characteristics of some important trees of eastern forests : A summary of the literature. (1980). doi:10.5962/bhl.title.150066
- J. A. Kurtz. (2017). Hacking Wireless Access Points. Hacking Wireless Access Points, 93-107. doi:10.1016/b978-0-12-805315-7.00007-3
- N. Pathak & A. Bhandari. (2018). Implementing Blockchain as a Service. IoT, AI, and Blockchain for. NET, 211-242. doi:10.1007/978-1-4842-3709-0_8
- J. H. Jeon, K. Kim & J. Kim. (2018). Block chain based data security enhanced IoT server platform. 2018 International Conference on Information Networking (ICOIN). (pp. 941-944). doi:10.1109/icoin.2018.8343262
- F. Alkurdi, I. Elgendi, K. S. Munasinghe, D. Sharma & A. Jamalipour. (2018). Blockchain in IoT Security: A Survey. 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). doi:10.1109/atnac.2018.8615409
- Y. H. Joh. (2014). A Framework for IoT-Based Convergence Personalized Menu Recommendation System. Journal of the Korea Convergence Society, 5(4), 147-153. https://doi.org/10.15207/JKCS.2014.5.4.147
- H. M. Jung, K. Jeong & H. J. Cho. (2017). A Design for Security Functional Requirements of IoT Middleware System. Journal of the Korea Convergence Society, 8(11), 63-69. https://doi.org/10.15207/JKCS.2017.8.11.063
- H.J. Kim, H. S. Lee, B. J. Choi & Y. H. Kim. (2019). Machine Learning-based Quality Control and Error Correction Using Homogeneous Temporal Data Collected by IoT Sensors. Journal of the Korea Convergence Society, 10(4), 17-23. https://doi.org/10.15207/JKCS.2019.10.4.017
- J. H. Oh & K. H. Lee. (2016). Attack Scenarios and Countermeasures using CoAP in IoT Environment. Journal of the Korea Convergence Society, 7(4), 33-38. https://doi.org/10.15207/JKCS.2016.7.4.033
- M. J. Lee. (2015). A Game Design for IoT environment. Journal of the Korea Convergence Society, 6(4), 133-138. https://doi.org/10.15207/JKCS.2015.6.4.133
- C. R. Seo & K. H. Lee. (2016). ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment. Journal of the Korea Convergence Society, 7(4), 39-44. https://doi.org/10.15207/JKCS.2016.7.4.039
- S. Sun Yoo & S. T. Kim. (2017). Development of Intelligent Gateway for IoT office service in small size. Journal of the Korea Convergence Society, 8(11), 37-42. https://doi.org/10.15207/JKCS.2017.8.11.037