1 |
K. B. Kim, H. J. Cho, "Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence", Journal of the Korea Convergence Society, Vol. 8, No. 5, pp. 29-35, May 2017.
DOI
|
2 |
B. C. Kim, "A Internet of Things(IoT) based exploration robot design for remote control and monitoring", Journal of digital Convergence, Vol. 13, No. 1, pp. 185-190, 2015.
DOI
|
3 |
J. Pacheco, S. Satam, S. Hariri, C. Grijalva and H. Berkenbrock, "IoT Security Development Framework for building trustworthy Smart car services," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, pp. 237-242, 2016.
|
4 |
B. Javed, M. W. Iqbal and H. Abbas, "Internet of things (IoT) design considerations for developers and manufacturers," 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, pp. 834-839, 2017.
|
5 |
J. Rivera, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020" retried from http://www.gartner.com/newsroom/id/2636073, July, 2017.
|
6 |
C. J. Chae, H. J. Cho, "Smart Fusion Agriculture based on Internet of Thing", Journal of the Korea Convergence Society, Vol. 7. No. 6, pp. 49-54, 2016.
DOI
|
7 |
J. H. Kim, J. Y. Go, K. H. Lee, "A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing", Korea Convergence Society, Vol. 6, No. 1, pp. 85-92, 2015.
|
8 |
B. Lee, W. S. Han. S. J. Kim, "Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things," Dec 2016.
|
9 |
M. J. Lee, "A Game Design for IoT environment", Journal of the Korea Convergence Society, Vol. 6, No. 4, 133-138, August 2015
DOI
|
10 |
M. K. Sik, H. W. Park, "Global Trends discussion on privacy in the IoT environment, Institute for Information & communications Technology Promotion," pp. 12-23, June 2015.
|
11 |
Y. S. Jeong, K. H. Han, S. H. Lee, "Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment", The Journal of Digital Convergence, Vol. 12, No. 7, pp. 279-284, 2014.
DOI
|
12 |
W. S. Bae, "Mutual authentication and Formal Verification in M2M Environment", The Journal of Digital Convergence, Vol. 12, No. 09, pp. 219-224, 2014.
|
13 |
P. D. Drobintsev, V. P. Kotlyarov, I. G. Chernorutsky, L. P. Kotlyarova and O. V. Aleksandrova, "Approach to adaptive control of technological manufacturing processes of IoT metalworking workshop," 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), Saint Petersburg, Russia, pp. 174-176, 2017.
|
14 |
Ciokorea, "Revenge.Theft.Peep...Smart Home Network is the New 'World of Hacking'," http://www.ciokorea.com/news/24723, 2015. 04.
|
15 |
J. Pacheco, S. Satam, S. Hariri, C. Grijalva and H. Berkenbrock, "IoT Security Development Framework for building trustworthy Smart car services," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, pp. 237-242. 2016.
|
16 |
Ministry of Science, ICT and Future Planning, "Internet of Things-Information Protection Roadmap," 2014.
|