Difference between revisions of "UNIK4750/List of papers"

From its-wiki.no
Jump to: navigation, search
(List of papers for UNIK 4750)
m (List of papers for UNIK 4750)
Line 1: Line 1:
 
= List of papers for UNIK 4750 =
 
= List of papers for UNIK 4750 =
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis]
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7129976&newsearch=true&queryText=internet%20of%20things%20security
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7129976&newsearch=true&queryText=internet%20of%20things%20security A. Aris, et al. "Internet-of-Things security: Denial of service attacks"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Stankovic, J.A., "Research Directions for the Internet of Things"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
  
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29
+
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C. ; Univ. of Texas at Dallas, Dallas, TX, USA ; Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
  
 
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29
 
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29

Revision as of 10:07, 28 January 2016

List of papers for UNIK 4750

Gang, G, et al., "Internet of Things Security Analysis"

K. Zhao and L. Ge, "A Survey on the Internet of Things Security"

A. Aris, et al. "Internet-of-Things security: Denial of service attacks"

Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"

Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"

Stankovic, J.A., "Research Directions for the Internet of Things"

Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"

Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"

Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"

Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"

Margulies, J., "Garage Door Openers: An Internet of Things Case Study"

Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"

Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"

Barreto, C. ; Univ. of Texas at Dallas, Dallas, TX, USA ; Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29

http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract

http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf

https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf

http://www.cisco.com/web/about/security/intelligence/iot_framework.html

http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785

https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf

https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf

https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf

http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism