Difference between revisions of "UNIK4750/List of papers"

From its-wiki.no
Jump to: navigation, search
m (List of papers for UNIK 4750)
(List of papers for UNIK 4750)
 
(12 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
__NOTITLE__
 
__NOTITLE__
 +
back to [[UNIK4750]]
 
= List of papers for UNIK 4750 =
 
= List of papers for UNIK 4750 =
 
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on:  [[Search_for_literature|Guide on how to search for Literature]]
 
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on:  [[Search_for_literature|Guide on how to search for Literature]]
Line 18: Line 19:
 
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
 
:7) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"]
  
:8) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"]
+
:8) '''Marit Iren R. Tokle''' - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6424332&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"]
  
:9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
+
:9) '''Sriramreddy Baddam''' - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
  
 
:10) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"]
 
:10) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7085953&filter%3DAND%28p_IS_Number%3A7085640%29 Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"]
  
:11) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
+
:11) '''Hafiz Muhammad Gulzar''' - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
  
:12) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"]  
+
:12) '''Kim Jonatan Wessel Bjørneset''' -  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"]  
  
:13) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
+
:13) '''Angélique Colle''' -  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
  
 
:14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
 
:14) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006441&filter%3DAND%28p_IS_Number%3A7006395%29 Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE  (Volume:12 ,  Issue: 6 )]
Line 50: Line 51:
 
:23) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"]
 
:23) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"]
  
:24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
+
:24) '''Alina Lapina''' - [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
  
 
:25) '''Raul''' - [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"]
 
:25) '''Raul''' - [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"]
  
:26) [http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"]
+
:26) '''Farooq Abdullah''' - [http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"]
 +
 
 +
Suggestions by students
 +
: 27) '''Mehdi''' -  Qi Jing, Athanasios V. Vasilakos , Jiafu Wan,  Jingwei Lu, and Dechao Qiu. [http://link.springer.com/article/10.1007%2Fs11276-014-0761-7  Security of the Internet of Things: perspectives and challenges, Wireless Netw (2014) 20:2481–2501]
 
</big>
 
</big>
 +
 +
== Evaluation criteria ==
 +
Your presentation is expected to last for 15-20 min (not longer). That means you need to identify the key messages of the selected paper. 
 +
Your presentation will be evaluated with respect to the following criteria:
 +
 +
Knowledge and Overview over topics in the paper
 +
* ''what is the paper about, which specific aspects are addressed?''
 +
 +
Identification of key findings of the paper:
 +
* ''why are the findings key findings, to what extend are they different from the state-of-knowledge?''
 +
* ''what are the strengths/weaknesses of the approaches being mentioned''
 +
 +
Scientifically precise presentation
 +
* ''Be precise in your formulations, avoid story telling.''
 +
* '' Use numbers where appropriate, e.g. 20% more''
 +
 +
Evaluation of the paper
 +
* ''what is your take on the paper? Criticism, own thoughts,...''
 +
 +
Style:
 +
* ''clear structure, clear and concise slides''
 +
* ''Provide examples, and respect the time''

Latest revision as of 21:40, 23 February 2016

back to UNIK4750

List of papers for UNIK 4750

Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature

1) Gang, G, et al., "Internet of Things Security Analysis"
2) Per Christian - K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
3) A. Aris, et al. "Internet-of-Things security: Denial of service attacks"
4) Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"
5) Jostein - Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"
6) Stankovic, J.A., "Research Directions for the Internet of Things"
7) Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"
8) Marit Iren R. Tokle - Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"
9) Sriramreddy Baddam - Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
10) Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"
11) Hafiz Muhammad Gulzar - Margulies, J., "Garage Door Openers: An Internet of Things Case Study"
12) Kim Jonatan Wessel Bjørneset - Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
13) Angélique Colle - Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"
14) Barreto, C., Giraldo, J. ; Cardenas, A.A. ; Mojica-Nava, E., "Control Systems for the Power Grid and Their Resiliency to Attacks", Security & Privacy, IEEE (Volume:12 , Issue: 6 )
15) McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"
16) Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"
17) Kargl, F. ; Inst. of Distrib. Syst., Univ. of Ulm, Ulm, Germany ; van der Heijden, R.W. ; Konig, H. ; Valdes, A., "Insights on the Security and Dependability of Industrial Control Systems"
18) Zafar, N., Arnautovic, E., Diabat, A., and Davor Svetinovic, "System Security Requirements Analysis:A Smart Grid Case Study"
19) Linn - Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"
20) Glendale Smart Grid Case study, ABB
21) CISCO, "Securing the Internet of Things: A proposed framework"
22) SANS Institute, "Securing the Internet of Things Survey"
23) Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"
24) Alina Lapina - Meltzer, D., "Securing the Industrial Internet of Things"
25) Raul - Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"
26) Farooq Abdullah - Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"

Suggestions by students

27) Mehdi - Qi Jing, Athanasios V. Vasilakos , Jiafu Wan, Jingwei Lu, and Dechao Qiu. Security of the Internet of Things: perspectives and challenges, Wireless Netw (2014) 20:2481–2501

Evaluation criteria

Your presentation is expected to last for 15-20 min (not longer). That means you need to identify the key messages of the selected paper. Your presentation will be evaluated with respect to the following criteria:

Knowledge and Overview over topics in the paper

  • what is the paper about, which specific aspects are addressed?

Identification of key findings of the paper:

  • why are the findings key findings, to what extend are they different from the state-of-knowledge?
  • what are the strengths/weaknesses of the approaches being mentioned

Scientifically precise presentation

  • Be precise in your formulations, avoid story telling.
  • Use numbers where appropriate, e.g. 20% more

Evaluation of the paper

  • what is your take on the paper? Criticism, own thoughts,...

Style:

  • clear structure, clear and concise slides
  • Provide examples, and respect the time