Author:
Maria Jones G.,Godfrey Winster S.,Santhosh Kumar S. V. N.
Reference18 articles.
1. V.R. Kebande, N.M. Karie, H.S. Venter, Cloud-centric framework for isolating big data as forensic evidence from IoT infrastructures, IEEE (2017)
2. S. Lee, B. Kang, K. Choa, D. Kanga, K. Jang, L. Park, S. Park, Design and Implementation for data protection of energy IoT utilizing OTP in the wireless mesh network, in 4th International Conference on Power and Energy System Engineering CPESE 2017, vol. 141, pp. 540–544 (Berlin, Germany, 25–29 Sep 2017), Energy Procedia
3. S. Bhattacharyaa, D. Wainwrighta, J. Whalley, Internet of Things (IoT) enabled assistive care services: Designing for value and trust, in International Workshop on Universal Design for IoT Smart Health (UDISH 2017), Procedia Comput. Sci. 113, 659–664 (2017)
4. S. Sahmim, H. Gharsellaoui, Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review, in International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017, 6–8 September 2017, Marseille, France, Procedia Comput. Sci. 112, 1516–1522 (2017)
5. R. Rajendren, S.V.N. Santhoh Kumar, Y. Palanichimy, K. Arputharaj, Dectection of DoS attacks in cloud networks using intelligent rule base classification system. Cluster Comput. pp. 1–12
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献