Industrial Internet of Things (IIoT). Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Industrial Internet of Things (IIoT) - Группа авторов страница 27
41. Qian, L. et al., Research of SQL injection attack and prevention technology. 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF), IEEE, 2015.
42. Wang, B. et al., DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw., 81, 308–319, 2015.
43. Alomar, N., Alsaleh, M., Alarifi, A., Social authentication applications, assaults, defense strategies and future research directions: a systematic review. IEEE Commun. Surv. Tutor., 19, 2, 1080–1111, 2017.
44. He, D., Chan, S., Guizani, M., Mobile application security: malware threats and defenses. IEEE Wirel. Commun., 22, 1, 138–144, 2015.
45. Vukalović, J. and Delija, D., Advanced persistent threats-detection and defense. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, 2015.
46. Anwar, S. et al., From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10, 2, 39, 2017.
47. Lee, J.-Y., Lin, W.-C., Huang, Y.-H., A lightweight authentication protocol for internet of things. 2014 International Symposium on Next-Generation Electronics (ISNE), IEEE, 2014.
48. Lina, Y., Lee, G., Kim, H., A Study on the Lora Systems. KICS Proceedings of Symposium of the Korean Institute of communications and Information Sciences, vol. 6, pp. 217–218, 2017.
49. Garam, K., Ahn, H-b, Kim, G.-B., Lee, J.E., Lee, S.-M., Lee, J.-H., IoT service development starting with Thingplug, pageblue, Korea, Nov 2015.
50. Underwood, S., Blockchain beyond bitcoin. Commun. ACM, 59, 15–17, Oct. 2016.
51. How blockchain can change the future of IoT, 20 Novemver 2016, [Online]. Available: https://venturebeat.com/2016/11/20/how-blockchain-can-changethe-future-of-iot/. [Accessed 2018].
52. Chiang, M. and Zhang, T., Fog and IoT: An overview of research opportunities. IEEE Internet Things J., 3, 854–864, Dec 2016.
53. Munoz, R., Mangues-Bafalluy, J., Vilalta, R., Verikoukis, C., Alonso-Zarate, J., Bartzoudis, N., Georgiadis, A., Payaro, M., Perez-Neira, A., Casellas, R., Martinez, R., Nunez-Martinez, J., Esteso, M.R., Pubill, D., Font-Bach, O., Henarejos, P., Serra, J., Vazquez-Gallego, F., The cttc 5g end-to-end experimental platform: Integrating heterogeneous wireless/optical networks, distributed cloud, and IoT devices. IEEE Veh. Technol. Mag., 11, 50–63, Mar 2016.
54. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Renzo, M.D., Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag., 53, 20–27, April 2015.
55. Xu, L., Xie, J., Xu, X., Wang, S., Enterprise lte and wifi interworking system and a proposed network selection solution, in: 2016 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 137–138, March 2016.
56. Fog Computing and the Internet of Things: Extend, in: Cisco, [Online]. Available: http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf, pp. 5. [Accessed 2018].
57. Rouse, M., Edge computing, August 2016, [Online]. Available: http://searchdatacenter.techtarget.com/definition/edge-computing. [Accessed 2018].
1 *Corresponding author: [email protected]
2 †Corresponding author: [email protected]
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.