Difference between revisions of "UNIK4750/List of papers"
From its-wiki.no
Josef.Noll (Talk | contribs) (→List of papers for UNIK 4750) |
Josef.Noll (Talk | contribs) |
||
Line 3: | Line 3: | ||
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: [[Search_for_literature|Guide on how to search for Literature]] | Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: [[Search_for_literature|Guide on how to search for Literature]] | ||
− | < | + | <big> |
:1) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"] | :1) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"] | ||
# [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"] | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"] | ||
Line 37: | Line 37: | ||
:16) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"] | :16) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"] | ||
− | :17) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract | + | :17) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"] |
− | http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf | + | :18) [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"] |
− | https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf | + | :19) ''access denied'' - https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf |
− | http://www.cisco.com/web/about/security/intelligence/iot_framework.html | + | :20) [http://www.cisco.com/web/about/security/intelligence/iot_framework.html CISCO, "Securing the Internet of Things: A proposed framework"] |
− | http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 | + | :21) [http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 SANS Institute, "Securing the Internet of Things Survey"] |
− | https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf | + | :22) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"] |
− | https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf | + | :23) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"] |
− | https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf | + | :24) [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"] |
− | http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism | + | :25) [http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"] |
− | </ | + | </big> |
Revision as of 12:08, 28 January 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 19) access denied - https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf