1 |
Architecture of IoT, http://www.lgcns.com/LGCNS.GHP.Main/Solution/IoTPlatform_En.
|
2 |
J. H. Kim, A Middleware Development Method for Internet of Things(IoT) Security, Master thesis of Far East University, 2017.
|
3 |
K.B. Kim and H.J. Cho,."A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence,"Journal of the Korea Convergence Society, Vol. 8, No. 5, pp.29-3, 2017.
DOI
|
4 |
J. H. Kim, J. Y. Go, K. H. Lee, "A Scheme of Social Engineering Attacks and Counter measures Using Big Data based Conversion Voice Phishing", Journal of the Korea Convergence Society, Vol. 6, No. 1, pp.85-91, 2015.
DOI
|
5 |
S. K. Park, "Proposal of a mobility management scheme for sensor nodes in IoT(Internet of Things)", Journal of Convergence Society for SMB, Vol. 6, No. 4, pp. 59-64, Dec. 2017
|
6 |
Middleware, https://ko.wikipedia.org/wiki/middleware
|
7 |
Steven Cherry with Ralph Langner, "How Stuxnet is Rewriting the Cyberterrorism Playbook",IEEE Spectrum, October 2010, .
|
8 |
L. Atzori, A. lera, G. Moraito, "The Internet of Things: A survey", Computer Networks, vol 54, no. 15, pp. 2787-2805, Oct. 2010.
DOI
|
9 |
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions", Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, Sept. 2013.
DOI
|
10 |
A. Whitmore, A. Agarwal, "The Internet of Things -A survey of topics and trends", Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, Apr. 2015.
DOI
|
11 |
Mario Weber and Marija Boban,"Security Challenges within IoT Systems,"Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2016, pp. 638-643, 2016
|
12 |
Edge_device, https://en.wikipedia.org/wiki/Edge_device
|
13 |
Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; Version 3.1, Revision 2, CCMB-2007-09-003.
|
14 |
Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; Version 3.1, Revision 1, CCMB-2006-09-001.
|
15 |
Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; Version 3.1, Revision 2, CCMB-2007-09-002.
|