References
- S. Sezer, (2018). T1C: IoT Security: - Threats, Security Challenges and IoT Security Research and Technology Trends, 2018 31st IEEE International System-on-Chip Conference (SOCC), Arlington, VA, 1-2.
- Y. Lee, J. Lim, Y. Jeon and J. Kim, (2015). Technology trends of access control in IoT and requirements analysis, 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, 1031-1033.
- D. Park, H. Bang, C. S. Pyo and S. Kang, (2014). Semantic open IoT service platform technology, 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, 85-88.
- J. Jung, K. Kim and J. Park, (2019). Framework of Big data Analysis about IoT-Home-device for supporting a decision making an effective strategy about new product design, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan, 582-584.
- Y. Lee, J. Lim, Y. Jeon and J. Kim, (2015). Technology trends of access control in IoT and requirements analysis, 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, 1031-1033.
- J. Yu and Y. Kim, (2019). Analysis of IoT Platform Security: A Survey, 2019 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea (South), 1-5.
- X. Ma and Y. Liu, (2010). Electronic Commerce Technology and its Security Problems, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jinggangshan, 631-634.
- G. D. Smith and C. A. Pocratsky, (1995). The Department of Energy's safeguards and security technology development program, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology, Sanderstead, Surrey, UK, 457-460.
- V. G. Semin, E. R. Khakimullin, A. S. Kabanov and A. B. Los, (2017). Problems of information security technology the "Internet of Things", 2017 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), St. Petersburg, 110-113.
- G. McGraw, (2011). Technology Transfer: A Software Security Marketplace Case Study, in IEEE Software, Sept.-Oct, 28(5), 9-11. https://doi.org/10.1109/MS.2011.110
- E. Orlandi, (1990). Computer security: a consequence of information technology quality, IEEE International Carnahan Conference on Security Technology, Crime Countermeasures, Lexington, KY, USA, 109-112.
- M. H. Miraz, M. Ali, P. S. Excell and R. Picking, (2015). A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT), 2015 Internet Technologies and Applications (ITA), Wrexham, 219-224.
- S. M. Alzahrani, (2017). Sensing for the Internet of Things and Its Applications, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Prague, 88-92.
- P. Kumar, (2017). Future Internet & Internet of Things, 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), Karachi, 1-1.
- S. G. Abdukhalilov, (2017). Problems of security networks internet things, 2017 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, 1-7.