최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털산업정보학회논문지 = Journal of the Korea Society of Digital Industry and Information Management, v.17 no.4, 2021년, pp.43 - 52
박종순 (서일대학교 소프트웨어공학과) , 박찬길 (숭실사이버대 정보보안학과)
IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and ma...
M. Ben Ayed, A. Massaoudi, and S. A. Alshaya, "Smart Recognition COVID-19 System to Predict Suspicious Persons Based on Face Features," J. Electr. Eng. Technol., 2021, pp.1-6.
C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, "Consumer, commercial and industrial iot (in) security: attack taxonomy and case studies," IEEE Internet Things J., 2021.
C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer (Long. Beach. Calif)., vol. 50, no. 7, 2017, pp.80-84.
D. Arivudainambi, V. K. KA, and S. S. Chakkaravarthy, "LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks," Neural Comput. Appl., vol. 31, no. 5, 2019, pp.1491-1501.
S. Koprda, Z. Balogh, M. Magdin, J. Reichel, and G. Molnar, "The Possibility of Creating a Low-Cost Laser Engraver CNC Machine Prototype with Platform Arduino," Acta Polytech. Hungarica, vol. 17, no. 9, 2020.
C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. Akyildiz, "A new wireless communication paradigm through software-controlled metasurfaces," IEEE Commun. Mag., vol. 56, no. 9, 2018, pp.162-169.
Q. Jiang, X. Zhang, and J. You, "SnO2: a wonderful electron transport layer for perovskite solar cells," Small, vol. 14, no. 31, pp.154-165., 2018, pp.154-165.
B. Peng, "Research On Detection Of Malicious Software," in 2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021, pp.400-403.
M. Busch, J. Westphal, and T. Mueller, "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment," in 14th Workshop on Offensive Technologies, 2020.
D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, "A survey on blockchain for information systems management and security," Inf. Process. Manag., vol. 58, no. 1, 2021, pp.397-407.
S. Bouraga, "A taxonomy of blockchain consensus protocols: A survey and classification framework," Expert Syst. Appl., vol. 168, 2021, pp.384-395.
G. Zyskind, O. Nathan, and A. Pentland, "Enigma: Decentralized computation platform with guaranteed privacy," arXiv Prepr. ar Xiv1506.03471, 2015.
Y. Zhang and J. Wen, "An IoT electric business model based on the protocol of bitcoin," in 2015 18th international conference on intelligence in next generation networks, 2015, pp.184-191.
A. Bahga and V. K. Madisetti, "Blockchain platform for industrial internet of things," J. Softw. Eng. Appl., vol. 9, no. 10, 2016, pp.533-546.
K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," Ieee Access, vol. 4, 2016, pp.2292-2303.
J. Kolb, M. AbdelBaky, R. H. Katz, and D. E. Culler, "Core concepts, challenges, and future directions in blockchain: a centralized tutorial," ACM Comput. Surv., vol. 53, no. 1, 2020, pp.1-39.
Y. El Housni, "Introduction to the Mathematical Foundations of Elliptic Curve Cryptography," 2018.
N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz, and Y. Smaragdakis, "Madmax: Surviving out-of-gas conditions in ethereum smart contracts," Proc. ACM Program. Lang., vol. 2, no. OOPSLA, 2018, pp.1-27.
I. Scott, M. de Castro Neto, and F. L. Pinheiro, "Bringing trust and transparency to the opaque world of waste management with blockchain: a Polkadot parathread application," Available SSRN 3825072, 2021.
A. Bora, A. Jalal, E. Price, and A. G. Dimakis, "Compressed sensing using generative models," in International Conference on Machine Learning, 2017, pp.537-546.
M. Ben Ayed, A. Massaoudi, S. A. Alshaya, and M. Abid, "System-level co-simulation for embedded systems," AIP Adv., vol. 10, no. 3, 2020, pp.113-125.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.