1 |
Ramnath, Deepak , Krishnakumar, Vijayaraghavan, S., Ramanathan, R. "An improved secret key update for multiple intersymbol obfuscation in physical layer security" in Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), India, 13-16 September 2017.
|
2 |
Al-Salloum, Wolthusen, "A link-layer-based self-replicating vulnerability discovery agent" in Proceedings of the IEEE symposium on Computers and Communications, Italy, 22-25 June 2010.
|
3 |
Christos Stergioua, Kostas E. Psannisa, Brij B. Guptab, Yutaka Ishibashic, "Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT", Sustainable Computing: Informatics and Systems, Vol. 19, pp. 174-184, 2018.
DOI
|
4 |
Adel S. Elmaghraby and Michael M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy", Journal of Advanced Research, Volume 5, pp. 491-497, 2014.
DOI
|
5 |
Rafal Leszczyna, "A review of standards with cybersecurity requirements for smart grid", Computers and Security Volume 77, pp. 262-276, 2018.
DOI
|
6 |
Allan A. Friedman and Darrell M. West, "Privacy and Security in Cloud Computing", Issues in Technology Innovation, No 3, pp24-29, November 2010
|
7 |
Aakanksha Tewari, B.B. Gupta, "Security, privacy and trust of different layers in Internet of Things (IoTs) framework", Future Generation Computer Systems, May 2018. Available at https://doi.org/10.1016/j.future.2018.04.027
DOI
|
8 |
S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead", Computer Networks Journal, Vol. 76, pp. 146-164, 2015.
DOI
|
9 |
Jianwei Hou, Leilei Qu, Wenchang Shi, "A survey on internet of things security from data perspectives", Computer Networks Journal, in press, Dec 2018.
|
10 |
Terence K.L. Huia, R. Simon Sherratt, Daniel Diaz Sanchez, Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies", Future Generation Computer Systems, Volume 76, 2017, pp. 358-369.
DOI
|
11 |
Anwaar AlDairi and Lo'ai Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies", The International Workshop on Smart Cities Systems Engineering (SCE 2017) Procedia Computer Science, Volume 109C, pp. 1086-1091, 2017.
|
12 |
Carol Hawk and Akhlesh Kaushiva, "Cybersecurity and the Smarter Grid", The Electricity Journal, Vol. 27, Issue 8, pp. 84-95, October 2014.
DOI
|
13 |
Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Naeem Syed, Matthew Peacock, "Future challenges for smart cities: Cyber-security and digital forensics", Journal of Digital Investigation, pp3-13, (2017).
|
14 |
Lu Z.; Shakeri., Razo M, Tacca, M.; Fumagalli, A., Galimberti, Martinelli,, Swallow, G. "Orchestration of reliable three-layer networks", in Proceedings of the 19th International Conference on Transparent Optical Networks (ICTON), Spain, 2-6 July 2017.
|
15 |
Ilhami Colak, Seref Sagiroglu, Gianluca Fulli, Mehmet Yesilbudak, Catalin Felix Covrig, "A survey on the critical issues in smart grid technologies", Renewable and Sustainable Energy Reviews, Volume 54, pp. 396-405, February 2016.
DOI
|
16 |
Zhihong Yang, Yingzhao Yue, Yu Yang, Yufeng Peng, Xiaobo Wang, Wenji Liu, "Study and application on the architecture and key technologies for IoT", in: Proceeding of 2011 International Conference on Multimedia Technology, pp. 747-751, ( ICMT), 2011.
|
17 |
Rishika Mehtaa , Jyoti Sahnib, Kavita Khannac, "Internet of Things: Vision, Applications and Challenges", International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, Vol. 132, pp. 1263-1269, 2018.
|
18 |
Sumitra Binu and Mohammed Misbahuddin, "A Survey of Traditional and Cloud Specific Security Issue" International Symposium on Security in computing and Communication, SSCC 2013: Security in Computing and Communications, Sabu M. Thampi et al. (Eds.): SSCC 2013, pp. 110-129, 2013.
|
19 |
"Top Threats to Cloud Computing + Industry Insights", CLOUD SECURITY ALLIANCE The Treacherous 12, 2017.
|
20 |
Zhifeng Xiao ; Yang Xiao, "Security and Privacy in Cloud Computing", IEEE Communications Surveys & Tutorials, Volume 15 , Issue 2 , pp. 843 - 859, Second Quarter 2013.
DOI
|
21 |
Jeevitha B. K., Thriveni J., Venugopal K. R, "Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey", International Journal of Computer Applications (0975 - 8887) Volume 156 - No 12, December 2016, pp. 16-27.
|
22 |
Mahmoud Ammar, Giovanni Russello, Bruno Crispo, "Internet of Things: A survey on the security of IoT frameworks", Journal of Information Security and Applications, Vol. 38, pp. 8-27, 2018.
DOI
|
23 |
Saeed Shafieian, Mohammad Zulkernine, Anwar Haque, "Attacks in Public Clouds: Can They Hinder the Rise of the Cloud", n: Mahmood Z. (eds) Cloud Computing. Computer Communications and Networks. Springer, Vol 6, pp. 3-22. 2014.
|
24 |
Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem, "Cloud Computing Security: A Survey", Journal of Computers, Volume 3, pp. 1-35, 2014.
|
25 |
Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn, " Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, Vol. 8, No. 6, pp. 24-31, 2010.
DOI
|
26 |
Rossouw von Solms and Johan van Niekerk," From information security to cyber security", computers and security, Volume 38, 2013, pp. 97-102
DOI
|
27 |
Maro Lacinak and Jozef Ristvej, "Smart city, Safety and Security", TRANSCOM 2017: International scientific conference on sustainable, modern and safe transport, Procedia Engineering, Volume 192, pp. 522 - 527, 2017. .
|
28 |
Rida Khatoun and Sherali Zeadally. "Smart cities: concepts, architectures, research opportunities". Magazine of Communications of the ACM, Volume 59, Issue 8, pp. 46-57 August 2016.
|
29 |
Zakaria El Mrabet, Naima Kaabouch , Hassan El Ghazi, Hamid El Ghazi, "Cyber-security in smart grid: Survey and challenges ", Computers and Electrical Engineering, Volume 67, 2018, pp. 469-482.
DOI
|