Design and Realization of the Intelligent System for Identification of the IoT Devices
R. Van Der Meulen, “Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015,” in: Gartner. Stamford, 2015.
J. Horalek, and V. Sobeslav, “Measuring of Electric Energy Consumption in Households by Means of Arduino Platform,” in: Advanced Computer and Communication Engineering Technology, 2016, pp. 819-830. DOI: 10.1007/978-3-319-24584-3_69
Hewlett Packard Enterprise, “Internet of things research study: 2015 report,” 2015 [online] Available: https://goo.gl/RRvvMh, Accessed: 2016-11-05.
J. Brozek, V. Fiala, J. Fikejz, and P. Pich, “Use of industrial control unit in intelligent homes,” in: ELEKTRO, 2016. Pp. 489-494. DOI: 10.1109/ELEKTRO.2016.7512124
O. Vermesan, D. Ovidiu, and P. Friess, “Internet of things: converging technologies for smart environments and integrated ecosystems,” 2013, ISBN 9788792982964.
S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT),” DOI: 10.1007/978-3-642-14478-3_42.
S. Babar, A. Stango, N. Prasad, J. Sen, and R. Prasad, “Proposed embedded security framework for Internet of Things (IoT),” in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011, pp. 1-5. DOI: 10.1109/WIRELESSVITAE.2011.5940923.
J. Yang, and B. Fang, “Security model and key technologies for the Internet of things,” in: The Journal of China Universities of Posts and Telecommunications. 2011, pp. 109-112. DOI: 10.1016/S1005- 8885(10)60159-8. ISSN 10058885.
M. Kelley, “The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought,” 2013, [online] Available: https://goo.gl/00KK9l, Accessed: 2016-10-01
R. Weber, “Internet of Things – New security and privacy challenges,” in: Computer Law & Security Review. 2010, DOI: 10.1016/j.clsr.2009.11.008.
Q. Jing, A.Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” in: Wireless Networks. 2014, pp. 2481-250. DOI: 10.1007/s11276-014-0761-7. ISSN 1022-0038.
C. Medaglia, and A. Serbanati, “An Overview of Privacy and Security Issues in the Internet of Things,” In: The Internet of Things. 2010. pp. 389. DOI: 10.1007/978-1-4419-1674-7_38.
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” in: Computer Networks, 2015, pp. 146-164. DOI: 10.1016/j.comnet.2014.11.008. ISSN 13891286.
L. Xu, W. He, and S. Li, “Internet of Things in Industries: A Survey,” in: IEEE Transactions on Industrial Informatics. 2014 pp. 2233-2243. DOI: 10.1109/TII.2014.2300753. ISSN 1551-3203.
J. Horalek, and V. Sobeslav, “IPv6 firewall functions analysis,” in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, pp. 219-228. DOI: 10.1007/978-3-319-45246-3_21.
T. Svoboda, and J. Horalek, “Analysis of security possibilities of platforms for 3D graphics,” in: Journal of Telecommunication, Electronic and Computer Engineering, 2016. pp. 43-47.
F. Holik, J. Horalek, O. Marik, S. Neradova, and S. Zitta, “Effective penetration testing with Metasploit framework and methodologies,” in: CINTI 2014 - 15th IEEE International Symposium on Computational Intelligence and Informatics, Proceedings, 2014, pp. 237-242. DOI: 10.1109/CINTI.2014.7028682.
DS2401 Silicon Serial Number. 2015. Maxim Integrated [online] available: https://datasheets.maximintegrated.com/en/ds/DS2401.pdf Accessed: 2016-09-17.
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions” in: Future Generation Computer Systems, 2013, pp. 1645-1660. DOI: http://dx.doi.org/10.1016/j.future.2013.01.010.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.