Author:
Gautam Sunil Kumar,Om Hari,Dixit Kumar
Reference27 articles.
1. Sherasiya, T., Upadhyay, & H., Patel, H. B. (2016). A survey: Intrusion detection system for internet of thing. International Journal of Computer Science and Engineering, 5(2), 91–98.
2. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the ip-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.
3. Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., & Hummen, R. (2013). Security considerations in the ip-based Internet of Things (pp. 1–19).
4. Hameed, S., Khan, F. I., & Hameed, B. (2019). Understanding security requirements and challenges in Internet of Things (IoT): A review. Journal of Computer Networks and Communications, 2019, 1–14.
5. Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., et al. (2016). Aot: Authentication and access control for the entire iot device life-cycle. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (pp. 1–15). ACM.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Service Discovery Approach for IoT-Based Application;Lecture Notes in Networks and Systems;2024
2. Outlier Analysis Based Intrusion Detection for IoT;2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2021-12-17
3. Service discovery in the Internet of Things: review of current trends and research challenges;Wireless Networks;2020-06-24