Difference between revisions of "UNIK4750/List of papers"

From its-wiki.no
Jump to: navigation, search
(List of papers for UNIK 4750)
Line 5: Line 5:
 
<big>
 
<big>
 
:1) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"]
 
:1) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"]
# [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"]
 
  
:2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7129976&newsearch=true&queryText=internet%20of%20things%20security A. Aris, et al. "Internet-of-Things security: Denial of service attacks"]
+
:2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"]
  
:3) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"]
+
:3) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7129976&newsearch=true&queryText=internet%20of%20things%20security A. Aris, et al. "Internet-of-Things security: Denial of service attacks"]
  
:4) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"]
+
:4) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"]
  
:5) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Stankovic, J.A., "Research Directions for the Internet of Things"]
+
:5) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"]
  
:6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
+
:6) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6774858&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Stankovic, J.A., "Research Directions for the Internet of Things"]
  
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"]
+
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
  
:8) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
+
:8) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"]
  
:9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"]
+
:9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
  
:10) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
+
:10) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"]
  
:11) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"]  
+
:11) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
  
:12) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
+
:12) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"]  
  
:13) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
+
:13) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
  
:14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"]
+
:14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
  
:15) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"]
+
:15) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C.,  Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"]
  
:16) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ;  van der Heijden, R.W. ;  Konig, H. ;  Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"]
+
:16) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"]
  
:17) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"]
+
:17) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ;  van der Heijden, R.W. ;  Konig, H. ;  Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"]
  
:18) [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"]
+
:18) [http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"]
  
:19) ''access denied'' - https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf
+
:19) [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"]
  
:20) [http://www.cisco.com/web/about/security/intelligence/iot_framework.html CISCO, "Securing the Internet of Things: A proposed framework"]
+
:20) [https://library.e.abb.com/public/dc58deb3e38a4f42b398576160621a04/glendale-smart-grid-network.pdf Glendale Smart Grid Case study, ABB]
  
:21) [http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 SANS Institute, "Securing the Internet of Things Survey"]
+
:21) [http://www.cisco.com/web/about/security/intelligence/iot_framework.html CISCO, "Securing the Internet of Things: A proposed framework"]
  
:22) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"]
+
:22) [http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 SANS Institute, "Securing the Internet of Things Survey"]
  
:23) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
+
:23) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"]
  
:24) [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"]
+
:24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
  
:25) [http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"]
+
:25) [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"]
 +
 
 +
:26) [http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"]
 
</big>
 
</big>

Revision as of 14:14, 29 January 2016

List of papers for UNIK 4750

Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature

1) Gang, G, et al., "Internet of Things Security Analysis"
2) K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
3) A. Aris, et al. "Internet-of-Things security: Denial of service attacks"
4) Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"
5) Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"
6) Stankovic, J.A., "Research Directions for the Internet of Things"
7) Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"
8) Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"
9) Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
10) Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"
11) Margulies, J., "Garage Door Openers: An Internet of Things Case Study"
12) Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
13) Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"
14) Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )
15) McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"
16) Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"
17) Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"
18) Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"
19) Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"
20) Glendale Smart Grid Case study, ABB
21) CISCO, "Securing the Internet of Things: A proposed framework"
22) SANS Institute, "Securing the Internet of Things Survey"
23) Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"
24) Meltzer, D., "Securing the Industrial Internet of Things"
25) Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"
26) Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"