Difference between revisions of "UNIK4750/List of papers"
Josef.Noll (Talk | contribs) |
Josef.Noll (Talk | contribs) m |
||
Line 1: | Line 1: | ||
+ | __NOTITLE__ | ||
= List of papers for UNIK 4750 = | = List of papers for UNIK 4750 = | ||
− | + | Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: [[Search_for_literature|Guide on how to search for Literature]] | |
− | |||
− | [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber= | + | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6006307&newsearch=true&queryText=internet%20of%20things%20security Gang, G, et al., "Internet of Things Security Analysis"] |
− | [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"] | + | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6746513&newsearch=true&queryText=internet%20of%20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"] |
+ | |||
+ | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7129976&newsearch=true&queryText=internet%20of%20things%20security A. Aris, et al. "Internet-of-Things security: Denial of service attacks"] | ||
+ | |||
+ | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751382&newsearch=true&queryText=internet%20of%20things%20security Ukil, A., Sen, J., and Koilakonda, S., "Embedded security for Internet of Things"] | ||
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"] | [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6017172&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"] | ||
Line 30: | Line 34: | ||
[http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"] | [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006406&filter%3DAND%28p_IS_Number%3A7006395%29 McParland, C., Peisert, S. ; Scaglione, A., "Monitoring Security of Networked Control Systems: It's the Physics"] | ||
− | [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, | + | # [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006438&filter%3DAND%28p_IS_Number%3A7006395%29 Peisert, S., Davis ; Margulies, J., Byres, E., Dorey, P., "Control Systems Security from the Front Lines"] |
− | + | ||
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7006412&filter%3DAND%28p_IS_Number%3A7006395%29 |
Revision as of 11:28, 28 January 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"
Stankovic, J.A., "Research Directions for the Internet of Things"
Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"
Lesk, M., "Safety Risks - Human Error or Mechanical Failure?: Lessons from Railways"
Margulies, J., "Garage Door Openers: An Internet of Things Case Study"
Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"
http://onlinelibrary.wiley.com/doi/10.1002/sys.21252/abstract
http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf
https://library.e.abb.com/public/aa732351067648abb02b9cc8b776bcdb/Glendale-smart-grid-network.pdf
http://www.cisco.com/web/about/security/intelligence/iot_framework.html
http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785
https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf
https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1170&context=ism