Author:
Kaushik Ajay Kumar,Sharma Deepak Kumar,Dhurandher Sanjay K.
Publisher
Springer International Publishing
Reference17 articles.
1. A. Colakovic, M. Hadzialic, Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39, . ISSN 1389-1286 (2018). https://doi.org/10.1016/j.comnet.2018.07.017
2. C. Perera et al., Semantic-driven configuration of Internet of Things middleware, in The 9th International Conference on Semantics, Knowledge and Grids., (IEEE, 2013), pp. 66–73
3. K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Commun. Surv. Tutorials 22(4), 2489–2520 (2020). https://doi.org/10.1109/COMST.2020.3011208
4. J. Gubbi et al., Internet of Things (IoT): A vision, architectural elements, and Future directions. Futur. Gener. Comput. Syst. 29, 7 (2013)
5. M. Loske, L. Rothe, D.G. Gertler, Context-aware authentication:- State-of-the-art evaluation and adaptation to the IIoT, in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), (2019), pp. 64–69. https://doi.org/10.1109/WF-IoT.2019.8767327
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献