Difference between revisions of "UNIK4750 Paper analysis"
From its-wiki.no
Josef.Noll (Talk | contribs) (Created page with "= UNIK4750 paper presentation v16 = ''Individual presentations on selected topics'' ** ''Please upload your slides by click on red link (login required). If you don't have...") |
Josef.Noll (Talk | contribs) |
||
(One intermediate revision by one other user not shown) | |||
Line 17: | Line 17: | ||
:'''Angélique Colle''' presents 13) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"] | :'''Angélique Colle''' presents 13) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"] | ||
::[[Media:Presentation_13_Privacy_BigData_Angelique.pdf]] - slides by Angelique | ::[[Media:Presentation_13_Privacy_BigData_Angelique.pdf]] - slides by Angelique | ||
− | |||
− | |||
:'''Alina Lapina''' presents 24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"] | :'''Alina Lapina''' presents 24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"] | ||
Line 30: | Line 28: | ||
:'''[[Mehdi Noroozi]]''' presents 27): [http://link.springer.com/article/10.1007%2Fs11276-014-0761-7 Security of the Internet of Things: perspectives and challenges] | :'''[[Mehdi Noroozi]]''' presents 27): [http://link.springer.com/article/10.1007%2Fs11276-014-0761-7 Security of the Internet of Things: perspectives and challenges] | ||
− | ::[https://goo.gl/ | + | ::[https://goo.gl/b1ldcl Presentation slides] - slides by Mehdi |
+ | |||
+ | :'''[[Linn Eirin Paulsen]]''' presents 19) [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"] | ||
+ | ::[[Media:19_Cyber_Security_Linn.pdf]] - slides by Linn | ||
:<strike>'''Sriramreddy Baddam'''</strike> presents 9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"] | :<strike>'''Sriramreddy Baddam'''</strike> presents 9) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"] | ||
:<strike>'''Hafiz Muhammad Gulzar'''</strike> presents 11) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"] | :<strike>'''Hafiz Muhammad Gulzar'''</strike> presents 11) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"] |
Latest revision as of 07:43, 8 April 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
UNIK4750 paper presentation v16
Individual presentations on selected topics
- Please upload your slides by click on red link (login required). If you don't have a login, please ask Mehdi or Josef to create - or send us your .pdf file.
- Per Christian presents 2) K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
- Media:Presentation_2_IoT_Survey_Per_Christian.pdf - slides by Per Christian
- Jostein Løvbråten presents 5) Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"
- Media:Presentation_5_Securing_IoT_Jostein.pdf - slides by Jostein
- Marit Iren R. Tokle presents 8) - Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"
- Kim Jonatan Wessel Bjørneset presents 12) Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
- Angélique Colle presents 13) - Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"
- Media:Presentation_13_Privacy_BigData_Angelique.pdf - slides by Angelique
- Alina Lapina presents 24) Meltzer, D., "Securing the Industrial Internet of Things"
- Media:Presentation_24_Securing_Industrial_IoT_Alina.pdf - slides by Alina
- Raul Khaydarshin presents 25) Assessing the Security of Internet Connected Critical Infrastructures
- Media:Presentation_25_Security_CI_Raul.pdf - slides by Raul
- Farooq Abdullah presents 26) Securing the Internet of Things Infrastructure - standards and techniques
- Media:Presentation_26_Securing_IoT_Infrastructure_Farooq.pdf - slides by Farooq
- Mehdi Noroozi presents 27): Security of the Internet of Things: perspectives and challenges
- Presentation slides - slides by Mehdi
- Linn Eirin Paulsen presents 19) Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"
- Media:19_Cyber_Security_Linn.pdf - slides by Linn
Sriramreddy Baddampresents 9) Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
Hafiz Muhammad Gulzarpresents 11) - Margulies, J., "Garage Door Openers: An Internet of Things Case Study"