Author:
Daud Mohammad Aizuddin,Suhaili Wida Susanty Haji
Publisher
Springer International Publishing
Reference13 articles.
1. Mario, B., Candid, W.: Insecurity in the Internet of Things. In: Symantec Security Response (2015)
2. Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. Informatik-spektrum 33(2), 107–121 (2010)
3. Villaverde, B., Pesch, D., Alberola, R.D.P., Fedor, S., Boubekeur, M.: Constrained application protocol for low power embedded networks: a survey. In: 2012 Sixth International Conference Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 702–707 (2011)
4. Colitti, W., Steenhaut, K., De Car, N., Buta, B., Dobrota, V.: Evaluation of constrained application protocol for wireless sensor network. In: 2011 18th IEEE Workshop Local Metropolitan Area Networks (LANMAN), pp. 1– 6 (2011)
5. Fielding, R., et al.: Hypertext transfer protocol – HTTP/1.1. The Internet Society (1999).
https://www.ietf.org/rfc/rfc2616.txt
. Accessed 1 Sep 2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献