Author:
Challa Madhavi Latha,Soujanya K.L.S.
Funder
CMR College of Engineering & Technology
Reference17 articles.
1. T. Abera, N. Asokan, L. Davi, F. Koushanfar, A. Paverd, A.-R. Sadeghi, G. Tsudik, Invited-things, trouble, trust: on building trust in IoT systems, in: Proceedingsof the 53rd Annual Design Automation Conference, ACM, 2016, p. 121.
2. M. Ali, N. Ono, M. Kaysar, Z. Shamszaman, T. Pham, F. Gao, K. Griffin, A. Mileo, Real-time data analytics and event detection for IoT-enabled communicationsystems, Web Semantics: Science, Services and Agents on the World WideWeb 42 (2017) 19–37.
3. A security authorization scheme for smart home internet of things devices;Chifor;Future Gener. Comput. Syst.,2018
4. L. Barreto, A. Celesti, M. Villari, M. Fazio, A. Puliafito, An authentication modelfor IoT clouds, in: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ACM, 2015,pp. 1032–1035.
5. Midgar: Detection of people through computer vision in the internet of things scenarios to improve the security in smart cities, smart towns, and smart homes;Garcia;Future Gener. Comput. Syst.,2017
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献