$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] Deep-learning approach to attack handling of IoT devices using IoT-enabled network services

Internet of things Iot : engineering cyber physical human systems, v.11, 2020년, pp.100241 -   

Yoon, John

Abstract AI-Helper 아이콘AI-Helper

Abstract The Internet of Things (IoT) is an emerging technology for network devices. Most IoT devices are enabled to connect to the Internet and to external cloud servers purposely or incidentally. It is likely that an attack goes into IoT devices or it is initiated by IoT devices, which is unless ...

Keyword

참고문헌 (30)

  1. Miettinen 1 2018 Proc. of the Int'l Conf. on Hardware/Software Codesign and System Sythesis Keynote: internet of things or treats? On building trust in IoT 

  2. A. Karl, Internet of everything vs. internet of things, http://techgenix.com/internet-of-everything/ (accessed on January 25, 2019). 

  3. Little 40 2017 Proc. of the 1st ACM Int'l Workshop on the Engineering of Reliable, Robust, and Secure Embedded Wireless Sensing Systems Understanding packet loss for sound monitoring in a smart stadium of IoT testbed 

  4. Li 159 2018 Proc. of the 16th ACM Conf. on Embedded Networked Sensor Systems Passive-ZigBee: enabling zigbee communication in IoT networks with 1000x+ less power consumption 

  5. Abhishek 1 2018 Proc. of the 14th Int'l Symposium on QoS and Security for Wireless and Mobile Networks Detecting forwarding misbehavior in clustered IoT networks 

  6. Matthews 92 2018 Proc. of ACM Technical Symposium on Computer Science Education, Baltimore, Maryland Portable parallel computing with the Raspberry Pi 

  7. Broring 131 2016 Proc. of IoT’16 Conference, Germany A categorization of discovery technologies for the Internet of Things 

  8. Hamza 1 2018 Proc. of the Workshop on IoT Security and Privacy Combining MUD policies with SDN for IoT intrusion detection 

  9. Martin 67 2017 Proc. of the 2nd Workshop on Cloud-Assisted Networking Fending off IoT-hunting attacks at home networks 

  10. Khan 55 2018 Proc. of the 1st Int'l Workshop on Edge Systems, Analytics and Networking Sizing buffers of IoT edge routers 

  11. Adat 423 2018 Telecommunication Systems Security in Internet of Things: issues, challenges, taxonomy, and architecture 

  12. IoT Secur. Priv. Valente 31 2017 Understanding security threats in consumer drones through the lens of the discovery quadcopter family 

  13. Siby 23 2018 Proc. of the 3rd Int'l Workshop on IoT Privacy, Trust, and Security IoTScanner: detecting privacy threats in IoT neighborhoods 

  14. Samaila 1 2018 Proc. of the 13th Int'l Conf. on Availability, Reliability and Security Security threats and possible countermeasures in IoT applications covering different industry domains 

  15. ICFNDS Kelly 1 2018 Optimisation of the public key encryption infrastructure for the internet of things 

  16. Network Sorcery, http://www.networksorcery.com/enp/default.htm, (accessed on Jan 21, 2019). 

  17. Wireshark, https://www.wireshark.org/, (accessed on Jan 15, 2019). 

  18. OWASPtop 10 vulnerabilities in IoT, https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf, (accessed on Jan 2, 2019). 

  19. Zaddach 279 2013 Proc. of the 29th Conf. on Computer Security Application Implementation and implications of a stealth hard-drive backdoor 

  20. Sparks 125 2009 Proc. of the 4th Int'l Symposium on Information, Computer, and Communication Security A chipset level network backdoor: bypassing host-based firewall & IDS 

  21. Internet of Things (IoT)Protocols and connectivity options: an Overview, https://www.sam-solutions.com/blog/internet-of-things-iot-protocols-and-connectivity-options-an-overview/, (accessed on Jan 21, 2019). 

  22. Georgios 1 2014 Proc of the 51st Annual Design Automation Conference Advanced techniques for designing stealthy hardware Trojans 

  23. Hofmann 270 2011 Proc. of the 16th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems Ensuring operating system kernel integrity with OSck 

  24. Suglia 202 2017 Proc. of the 25th Conf. on User Modeling, Adaptation and Personalization A deep architecture for content-based recommendations exploiting recurrent neural networks 

  25. Wuraola 1 2018 In Proc. of Int'l Joint Conf. on Neural Network SQNL: a new computationally efficient activation function 

  26. Computers Yoon December 1 2018 Trustworthiness of dynamic moving sensors for secure mobile edge computing 

  27. Metodoloski Zvezki Vuk 3 89 2006 ROC Curve, lift chart and calibration plot 

  28. Chaabane 7 2012 Proc. of ACM Workshop on online social networks Big friend is watching you: analyzing online social network tracking capabilities 

  29. Beckett 386 2016 Proc. of the 37th ACM SIGPLAN Conf. on Programming Language Design and Implementation Temporal NetKAT 

  30. Narayana 181 2014 Proc. of the 3rd Workshop on Hot Topics in Software Defined Networking Compiling path queries in software-defined networks 

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 논문

해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

관련 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로