1 |
Somia Sahraoui and Azeddine Bilami, "Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things," in Proc. of IoT'16 Proceedings of the 6th International Conference on the Internet of Things, pp.131-139, November 07-09, 2016.
|
2 |
Meesun Kim, Hyun Ahn and Kwanghoon Pio Kim, "Process-Aware Internet of Things: A Conceptual Extension of the Internet of Things Framework and Architecture," KSII Transactions on Internet and Information Systems, vol. 10, no. 8, August 31, 2016.
|
3 |
Vu-Anh-Quang Nguyen, "Study on realtime control system in IoT based smart factory: Interference awareness, architectural elements, and its application," in Proc. of Information Science and Technology (ICIST), 2017 Seventh International Conference on, April 16-19, 2017.
|
4 |
H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi, M. Shafie-khah and P. Siano, "Iot-based Smart Cities: A Survey," in Proc. of Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, June 7-10, 2016.
|
5 |
Jorge Alfonso, Nuria Sanchez, Jose Manuel Menendez and Emilio Cacheiro, "Cooperative ITS communications architecture: the FOTsis project approach and beyond," IET Intelligent Transport System, vol. 9, issue. 6, pp.591-598, August 06, 2015.
DOI
|
6 |
McAfee Labs, McAfee Labs Threats Report September 2018, September, 2018.
|
7 |
Taejin Lee and Jin Kwak, "Effective and Reliable Malware Group Classification for a Massive Malware Environment," International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Volume 2016, 2016.
|
8 |
Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor and Shahaboddin Shamshirband, "Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues," KSII Transactions on Internet and Information Systems, vol. 9, no.4, April 30, 2015.
|
9 |
James A. Jerkins, "Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code," in Proc. of Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual, January 09-11, 2017.
|
10 |
Ahmed El-Kosairy and Marianne A. Azer, "Intrusion and ransomware detection system," in Proc. of 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), September 27, 2018.
|
11 |
Taejin Lee, Bomin Choi, Youngsang Shin and Jin Kwak, "Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient," The Journal of Supercomputing, Springer, 18 December, 2015.
|
12 |
Zhang Fuyong and Zhao Tiezhu, "Malware Detection and Classification Based on ngrams Attribute Similarity," in Proc. of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 21 July, 2017.
|
13 |
Arzu Gorgulu Kakisim, Mert Nar, Necmettin Carkaci and Ibrahim Sogukpinar, "Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods," Innovative Security Solutions for Information Technology and Communications (SECITC 2018), pp 247-258, Feb, 2019.
|