Author:
Sicari Sabrina,Cappiello Cinzia,De Pellegrini Francesco,Miorandi Daniele,Coen-Porisini Alberto
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference31 articles.
1. Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). “Anonymous authentication for privacy-preserving IOT target-driven applications.” Computers & Security, 37, 111–123.
2. Ali, M., Eltabakh, M., & Nita-rotaru, C. (2004). “Robust security mechanisms for data streams systems,” Purdue university, csd technical report 04-019.
3. Anton, A. (1996). “Goal-based requirements analysis,” in Proceedings of the Second International Conference on Requirements Engineering, pp. 136–144.
4. Atzori, L., Iera, A., & Morabito, G. (2010). “The internet of things: A survey.” Computer networks, 54(15), 2787–2805.
5. Ballou, D. P., & Pazer, H. L. (1985). Modeling Data and Process Quality in Multi-input, Multi-output Information Systems. Management Science, 31(2), 150–162.
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献