Author:
Becker Luc,Hofmann Adrian
Publisher
Springer Fachmedien Wiesbaden
Reference38 articles.
1. Alramadhan, M. und Sha, K. (2017). An Overview of Access Control Mechanisms for Internet of Things. In 2017 26th International Conference on Computer Communication and Networks (ICCCN), Seiten 1–6. IEEE.
2. Bai, L., Hu, M., Liu, M., undWang, J. (2019). BPIIoT: A Light-weighted Blockchain-based Platform for Industrial IoT. IEEE Access, 7:58381–58393.
3. Bitkom (2018). Spionage, Sabotage und Datendiebstahl - Wirtschaftsschutz in der Industrie. Studienbericht 2018. https://www.bitkom.org/sites/default/files/2020-02/200211_bitkom_studie_wirtschaftsschutz_2020_final.pdf. Zugegriffen am 14.12.2020.
4. Bühler, P., Schlaich, P., und Sinner, D. (2019). Datenschutz–Datensicherheit. In Datenmanagement, Seiten 80–97. Springer.
5. Chang, K.-C. und Wang, C.-P. (2011). Information Systems Resources and Information Security. Information Systems Frontiers, 13(4):579–593.