Difference between revisions of "UNIK4750/List of papers"
From its-wiki.no
(→List of papers for UNIK 4750) |
(→List of papers for UNIK 4750) |
||
Line 26: | Line 26: | ||
:11) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"] | :11) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7180227&filter%3DAND%28p_IS_Number%3A7180218%29 Margulies, J., "Garage Door Openers: An Internet of Things Case Study"] | ||
− | :12) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"] | + | :12) '''Kim Jonatan Wessel Bjørneset''' - [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7310800&filter%3DAND%28p_IS_Number%3A7310797%29 Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"] |
:13) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"] | :13) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6756784&filter%3DAND%28p_IS_Number%3A6756734%29 Eckhoff, D. ; and Sommer, C., "Driving for Big Data? Privacy Concerns in Vehicular Networking"] |
Revision as of 10:59, 4 February 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 2) Per Christian - K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
- 9) Sriramreddy baddam - Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
- 12) Kim Jonatan Wessel Bjørneset - Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
- 26) Farooq Abdullah - Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"