1 |
KOLIAS, Constantinos, et al. DDoS in the IoT: Mirai and other botnets. Computer, 2017, 50.7: 80-84. DOI : https://doi.org/10.1109/mc.2017.201
DOI
|
2 |
YANG, Yuchen, et al. A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 2017, 4.5: 1250-1258. DOI : https://doi.org/10.1109/jiot.2017.2694844
DOI
|
3 |
FRUSTACI, Mario, et al. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of Things Journal, 2017, 5.4: 2483-2495. DOI : https://doi.org/10.1109/jiot.2017.2767291
DOI
|
4 |
KHAN, Minhaj Ahmad; SALAH, Khaled. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018, 82: 395-411. DOI : https://doi.org/10.1016/j.future.2017.11.022
DOI
|
5 |
BKAMBLE, Ashvini; BHUTAD, Sonali. Survey on Internet of Things (IoT) security issues & solutions. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC). IEEE, 2018. pp. 307-312. DOI : https://doi.org/10.1109/icisc.2018.8399084
|
6 |
SAMIE, Farzad; BAUER, Lars; HENKEL, Jorg. IoT technologies for embedded computing: A survey. In: Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM, 2016. p. 8. DOI : https://doi.org/10.1145/2968456.2974004
|
7 |
SAHA, Himadri Nath; MANDAL, Abhilasha; SINHA, Abhirup. Recent trends in the Internet of Things. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, 2017. pp. 1-4.
|
8 |
SOHOEL, Halldis; JAATUN, Martin Gilje; BOYD, Colin. OWASP Top 10-Do Startups Care?. In: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2018. pp. 1-8. DOI : https://doi.org/10.1109/cybersecpods.2018.8560666
|
9 |
RAY, Partha Pratim. Internet of things for smart agriculture: Technologies, practices and future direction. Journal of Ambient Intelligence and Smart Environments, 2017, 9.4: 395-420. DOI : https://doi.org/10.3233/ais-170440
DOI
|
10 |
PONTA, Serena Elisa; PLATE, Henrik; SABETTA, Antonino. Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2018. pp. 449-460. DOI : https://doi.org/10.1109/icsme.2018.00054
|
11 |
FELDMAN, Paul. A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). IEEE, 1987. pp. 427-438. DOI : https://doi.org/10.1109/sfcs.1987.4
|
12 |
ZHANG, Wensheng; ZHU, Sencun; CAO, Guohong. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad hoc networks, 2009, 7.6: 1229-1242. DOI : https://doi.org/10.1016/j.adhoc.2008.11.004
DOI
|