Author:
Pandey Neeraj Kumar,Kumar Ajitesh
Publisher
Springer International Publishing
Reference27 articles.
1. Boeckl, K., Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., & Scarfone, K. (2019). Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. Gaithersburg: US Department of Commerce, National Institute of Standards and Technology.
2. Zhang, Y., Peng, L., Sun, Y., & Lu, H. (2018). Intelligent industrial IoT integration with cognitive computing. Mobile Networks and Applications, 23(2), 185–187.
3. Pandey, N. K., Chaudhary, S., & Joshi, N. K. (2017). Extended multi queue job scheduling in cloud. International Journal of Computer Science and Information Security (IJCSIS), 15(11), 1–8.
4. Gershenfeld, N. A., & Gershenfeld, N. (2000). When things start to think. New York: Macmillan Publishers.
5. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT Based Energy Efficient Smart Home Security;2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT);2023-09-08
2. Security issues and challenges in cloud of things-based applications for industrial automation;Annals of Operations Research;2023-03-21
3. Optimize a novel Integrated Solutions to analyses Privacy persevering of the Internet of Things;2023 6th International Conference on Information Systems and Computer Networks (ISCON);2023-03-03