Difference between revisions of "UNIK4750 Paper analysis"

From its-wiki.no
Jump to: navigation, search
(Created page with "= UNIK4750 paper presentation v16 = ''Individual presentations on selected topics'' ** ''Please upload your slides by click on red link (login required). If you don't have...")
 
m
Line 17: Line 17:
 
:'''Angélique Colle''' presents 13) -  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
 
:'''Angélique Colle''' presents 13) -  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"]
 
::[[Media:Presentation_13_Privacy_BigData_Angelique.pdf]] - slides by Angelique
 
::[[Media:Presentation_13_Privacy_BigData_Angelique.pdf]] - slides by Angelique
 
:'''[[Linn Eirin Paulsen]]''' presents 19)  [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"]
 
  
 
:'''Alina Lapina''' presents 24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
 
:'''Alina Lapina''' presents 24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"]
Line 30: Line 28:
  
 
:'''[[Mehdi Noroozi]]''' presents 27):  [http://link.springer.com/article/10.1007%2Fs11276-014-0761-7  Security of the Internet of Things: perspectives and challenges]
 
:'''[[Mehdi Noroozi]]''' presents 27):  [http://link.springer.com/article/10.1007%2Fs11276-014-0761-7  Security of the Internet of Things: perspectives and challenges]
::[https://goo.gl/S9vA4J Presentation slides] - slides by Mehdi
+
::[https://goo.gl/b1ldcl Presentation slides] - slides by Mehdi
 +
 
 +
:'''[[Linn Eirin Paulsen]]''' presents 19)  [http://www.ece.ncsu.edu/netwis/papers/13wl-comnet.pdf Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"]
  
 
:<strike>'''Sriramreddy Baddam'''</strike> presents 9)  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
 
:<strike>'''Sriramreddy Baddam'''</strike> presents 9)  [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031838&filter%3DAND%28p_IS_Number%3A7031815%29 Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"]
  
 
:<strike>'''Hafiz Muhammad Gulzar'''</strike> presents 11) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]
 
:<strike>'''Hafiz Muhammad Gulzar'''</strike> presents 11) - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"]

Revision as of 17:53, 31 March 2016

UNIK4750 paper presentation v16

Individual presentations on selected topics

    • Please upload your slides by click on red link (login required). If you don't have a login, please ask Mehdi or Josef to create - or send us your .pdf file.
Per Christian presents 2) K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
Media:Presentation_2_IoT_Survey_Per_Christian.pdf - slides by Per Christian
Jostein Løvbråten presents 5) Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"
Media:Presentation_5_Securing_IoT_Jostein.pdf - slides by Jostein
Marit Iren R. Tokle presents 8) - Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"
Presentation foils by Marit
Kim Jonatan Wessel Bjørneset presents 12) Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
Presentation foils by Kim
Angélique Colle presents 13) - Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"
Media:Presentation_13_Privacy_BigData_Angelique.pdf - slides by Angelique
Alina Lapina presents 24) Meltzer, D., "Securing the Industrial Internet of Things"
Media:Presentation_24_Securing_Industrial_IoT_Alina.pdf - slides by Alina
Raul Khaydarshin presents 25) Assessing the Security of Internet Connected Critical Infrastructures
Media:Presentation_25_Security_CI_Raul.pdf - slides by Raul
Farooq Abdullah presents 26) Securing the Internet of Things Infrastructure - standards and techniques
Media:Presentation_26_Securing_IoT_Infrastructure_Farooq.pdf - slides by Farooq
Mehdi Noroozi presents 27): Security of the Internet of Things: perspectives and challenges
Presentation slides - slides by Mehdi
Linn Eirin Paulsen presents 19) Wang, W., and Lu, Z., "Cyber security in the Smart Grid: Survey and challenges"
Sriramreddy Baddam presents 9) Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
Hafiz Muhammad Gulzar presents 11) - Margulies, J., "Garage Door Openers: An Internet of Things Case Study"