标题
The Internet of Things: a security point of view
作者
关键词
-
出版物
Internet Research
Volume 26, Issue 2, Pages 337-359
出版商
Emerald
发表日期
2016-03-24
DOI
10.1108/intr-07-2014-0173
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Trust management mechanism for Internet of Things
- (2014) Lize Gu et al. China Communications
- Security in wireless ad-hoc networks – A survey
- (2014) R. Di Pietro et al. COMPUTER COMMUNICATIONS
- An Interactive Trust Model for Application Market of the Internet of Things
- (2014) Kai Kang et al. IEEE Transactions on Industrial Informatics
- User Interoperability With Heterogeneous IoT Devices Through Transformation
- (2014) Guangyi Xiao et al. IEEE Transactions on Industrial Informatics
- CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System
- (2014) Fei Tao et al. IEEE Transactions on Industrial Informatics
- IoT-Based Configurable Information Service Platform for Product Lifecycle Management
- (2014) Hongming Cai et al. IEEE Transactions on Industrial Informatics
- Internet of Things for Enterprise Systems of Modern Manufacturing
- (2014) Zhuming Bi et al. IEEE Transactions on Industrial Informatics
- QoS-Aware Scheduling of Services-Oriented Internet of Things
- (2014) Ling Li et al. IEEE Transactions on Industrial Informatics
- Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services
- (2014) Boyi Xu et al. IEEE Transactions on Industrial Informatics
- IoT-Based Smart Rehabilitation System
- (2014) Yuan Jie Fan et al. IEEE Transactions on Industrial Informatics
- Internet of Things in Industries: A Survey
- (2014) Li Da Xu et al. IEEE Transactions on Industrial Informatics
- The internet of things: a survey
- (2014) Shancang Li et al. INFORMATION SYSTEMS FRONTIERS
- Time-Reversal Wireless Paradigm for Green Internet of Things: An Overview
- (2014) Yan Chen et al. IEEE Internet of Things Journal
- Securing the Internet of Things: A Standardization Perspective
- (2014) Sye Loong Keoh et al. IEEE Internet of Things Journal
- Cyberentity Security in the Internet of Things
- (2013) Huansheng Ning et al. COMPUTER
- On the features and challenges of security and privacy in distributed internet of things
- (2013) Rodrigo Roman et al. Computer Networks
- Lithe: Lightweight Secure CoAP for the Internet of Things
- (2013) Shahid Raza et al. IEEE SENSORS JOURNAL
- Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things
- (2013) Fagen Li et al. IEEE SENSORS JOURNAL
- A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
- (2013) Xuanxia Yao et al. IEEE SENSORS JOURNAL
- RFID in the warehouse: A literature analysis (1995–2010) of its applications, benefits, challenges and future trends
- (2013) Ming K. Lim et al. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS
- Internet of things: Vision, applications and research challenges
- (2012) Daniele Miorandi et al. Ad Hoc Networks
- The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization
- (2012) Luigi Atzori et al. Computer Networks
- Integration of Distributed Enterprise Applications: A Survey
- (2012) Wu He et al. IEEE Transactions on Industrial Informatics
- Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
- (2012) HyungJun Kim International Journal of Distributed Sensor Networks
- Securing the Internet of Things
- (2011) Rodrigo Roman et al. COMPUTER
- Security and Privacy in an Online World
- (2011) Rolf Oppliger COMPUTER
- Combining heterogeneous service technologies for building an Internet of Things middleware
- (2011) Kiev Gama et al. COMPUTER COMMUNICATIONS
- Enterprise Systems: State-of-the-Art and Future Trends
- (2011) Li Da Xu IEEE Transactions on Industrial Informatics
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
- (2010) Cristina Alcaraz et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Cooperative communications based on trust model for mobile ad hoc networks
- (2010) K. Wang et al. IET Information Security
- Information architecture for supply chain quality management
- (2010) Li Da Xu INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services
- (2010) Dominique Guinard et al. IEEE Transactions on Services Computing
- Perci: Pervasive Service Interaction with the Internet of Things
- (2009) G. Broll et al. IEEE INTERNET COMPUTING
- Building the Internet of Things Using RFID: The RFID Ecosystem Experience
- (2009) Evan Welbourne et al. IEEE INTERNET COMPUTING
- Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain
- (2007) Eleonora Bottani et al. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started