최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Internet of things Iot : engineering cyber physical human systems, v.11, 2020년, pp.100241 -
Yoon, John
Abstract The Internet of Things (IoT) is an emerging technology for network devices. Most IoT devices are enabled to connect to the Internet and to external cloud servers purposely or incidentally. It is likely that an attack goes into IoT devices or it is initiated by IoT devices, which is unless ...
Miettinen 1 2018 Proc. of the Int'l Conf. on Hardware/Software Codesign and System Sythesis Keynote: internet of things or treats? On building trust in IoT
A. Karl, Internet of everything vs. internet of things, http://techgenix.com/internet-of-everything/ (accessed on January 25, 2019).
Little 40 2017 Proc. of the 1st ACM Int'l Workshop on the Engineering of Reliable, Robust, and Secure Embedded Wireless Sensing Systems Understanding packet loss for sound monitoring in a smart stadium of IoT testbed
Li 159 2018 Proc. of the 16th ACM Conf. on Embedded Networked Sensor Systems Passive-ZigBee: enabling zigbee communication in IoT networks with 1000x+ less power consumption
Abhishek 1 2018 Proc. of the 14th Int'l Symposium on QoS and Security for Wireless and Mobile Networks Detecting forwarding misbehavior in clustered IoT networks
Matthews 92 2018 Proc. of ACM Technical Symposium on Computer Science Education, Baltimore, Maryland Portable parallel computing with the Raspberry Pi
Broring 131 2016 Proc. of IoT’16 Conference, Germany A categorization of discovery technologies for the Internet of Things
Hamza 1 2018 Proc. of the Workshop on IoT Security and Privacy Combining MUD policies with SDN for IoT intrusion detection
Martin 67 2017 Proc. of the 2nd Workshop on Cloud-Assisted Networking Fending off IoT-hunting attacks at home networks
Khan 55 2018 Proc. of the 1st Int'l Workshop on Edge Systems, Analytics and Networking Sizing buffers of IoT edge routers
Adat 423 2018 Telecommunication Systems Security in Internet of Things: issues, challenges, taxonomy, and architecture
IoT Secur. Priv. Valente 31 2017 Understanding security threats in consumer drones through the lens of the discovery quadcopter family
Siby 23 2018 Proc. of the 3rd Int'l Workshop on IoT Privacy, Trust, and Security IoTScanner: detecting privacy threats in IoT neighborhoods
Samaila 1 2018 Proc. of the 13th Int'l Conf. on Availability, Reliability and Security Security threats and possible countermeasures in IoT applications covering different industry domains
ICFNDS Kelly 1 2018 Optimisation of the public key encryption infrastructure for the internet of things
Network Sorcery, http://www.networksorcery.com/enp/default.htm, (accessed on Jan 21, 2019).
Wireshark, https://www.wireshark.org/, (accessed on Jan 15, 2019).
OWASPtop 10 vulnerabilities in IoT, https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf, (accessed on Jan 2, 2019).
Zaddach 279 2013 Proc. of the 29th Conf. on Computer Security Application Implementation and implications of a stealth hard-drive backdoor
Sparks 125 2009 Proc. of the 4th Int'l Symposium on Information, Computer, and Communication Security A chipset level network backdoor: bypassing host-based firewall & IDS
Internet of Things (IoT)Protocols and connectivity options: an Overview, https://www.sam-solutions.com/blog/internet-of-things-iot-protocols-and-connectivity-options-an-overview/, (accessed on Jan 21, 2019).
Georgios 1 2014 Proc of the 51st Annual Design Automation Conference Advanced techniques for designing stealthy hardware Trojans
Hofmann 270 2011 Proc. of the 16th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems Ensuring operating system kernel integrity with OSck
Suglia 202 2017 Proc. of the 25th Conf. on User Modeling, Adaptation and Personalization A deep architecture for content-based recommendations exploiting recurrent neural networks
Wuraola 1 2018 In Proc. of Int'l Joint Conf. on Neural Network SQNL: a new computationally efficient activation function
Computers Yoon December 1 2018 Trustworthiness of dynamic moving sensors for secure mobile edge computing
Metodoloski Zvezki Vuk 3 89 2006 ROC Curve, lift chart and calibration plot
Chaabane 7 2012 Proc. of ACM Workshop on online social networks Big friend is watching you: analyzing online social network tracking capabilities
Beckett 386 2016 Proc. of the 37th ACM SIGPLAN Conf. on Programming Language Design and Implementation Temporal NetKAT
Narayana 181 2014 Proc. of the 3rd Workshop on Hot Topics in Software Defined Networking Compiling path queries in software-defined networks
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.