1 |
Choi, J. W., "The status and prospect of the IoT market," Kotra, 2016.
|
2 |
Gartner, "Press Release: Global Internet of Things Market to Grow to 27 Billion Devices, Generating USD 3 Trillion Revenue in 2025," Gartner, 2016.
|
3 |
Han, J. J., "Configuring the design and inspection item for reviewing the Internet of Things (IoT) security," Master's thesis in Yonsei University, pp. 41-57, 2016.
|
4 |
IoT Security Alliance, "IoT Common Security Guide," IoT Security Alliance, p. 3 2016.
|
5 |
IoT Security Alliance, "IoT Common Security Principles," IoT Security Alliance, pp. 1-10, 2016.
|
6 |
Kang, J. M., "How to Validate Smart TV Security in an Internet of Things," Master's thesis at Soongsil University, pp. 28-29, 2016.
|
7 |
Kim, E. A., "A Study on Development and Application of Taxonomy of Internet of Things Service," The Journal of Society for e-Business Studies, Vol. 20, No. 2, pp. 107-123, 2015.
DOI
|
8 |
Korea Institute for industrial Economics & Trade, "Safety Net in the Age of Internet of Things, Convergence Security Industry," KIET, pp. 1-8, 2014.
|
9 |
Korea Internet & Security Agency. "Seven Cyber Attacks Forecasts of 2019," KISA, p. 13, 2018.
|
10 |
Kumar, S. A. and Vealey, H. S., "Security in Internet of Things: Challenges, Solutions and Future Directions," IEEE, pp. 1-9, 2016.
|
11 |
Lin, H. and N. W. Bergmann, "IoT Privacy and Security Challenges for Smart Home Environments," Information, pp. 1-13, 2016.
|
12 |
OWASP, "OWASP IoT Top 10," OWASP, 2014.
|
13 |
Shostack, A., "Experience Threat Modeling at Microsoft," Microsoft, 2008.
|
14 |
Shostack, A., Threat Modeling: Design for Security, WILEY, pp. 1-30, 2014.
|
15 |
Torr, P., "Demystifying the Threat modeling process," IEEE Security & Private, Vol. 3, No. 5, pp. 66-70, 2005.
DOI
|