M. Monga, R. Paleari, и E. Passerini. Proceedings of fifth international workshop on
software engineering for secure systems (SESS'09), стр. 25--32. IEEE CS, IEEE, (мая 2009)
Y. Ponomarchuk, и D. Seo. Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications (ICUT '09), стр. 1-6. (2009)
N. Gatti, M. Monga, и S. Sicari. Decision and Game Theory for Security, том 6442 из Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, Berlin, Germany, (ноября 2010)
K. Kuppusamy, Senthilraja.R, и G. Aghila. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2 (1):
95-104(февраля 2012)
C. Liaskos, V. Kotronis, и X. Dimitropoulos. IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, стр. 1-9. (апреля 2016)
C. Kloukinas, и G. Spanoudakis. Trust, Privacy and Security in Digital Business, том 4657 из Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2007)
C. Bellettini, и J. Rrushi. Proceedings of The Ifip Tc 11 23rd International Information Security Conference, том 278 из IFIP – The International Federation for Information Processing, Springer US, (2008)
M. Bilal, и S. Kang. (2017)cite arxiv:1704.02683Comment: This article is accepted for the publication in Cluster Computing-The Journal of Networks, Software Tools and Applications. Print ISSN 1386-7857, Online ISSN 1573-7543.
M. Bilal, и S. Kang. Cluster Computing, 20 (3):
2779–2792(2017)cite arxiv:1704.02683Comment: This article is accepted for the publication in Cluster Computing-The Journal of Networks, Software Tools and Applications. Print ISSN 1386-7857, Online ISSN 1573-7543.
A. Lanzi, L. Martignoni, M. Monga, и R. Paleari. SESS'07: Proceedings of the 3$^rd$ International
Workshop on Software Engineering for Secure Systems, ACM, IEEE Computer Society, (мая 2007)
Y. Zhang, Q. Liu, и Y. Liu. Proceedings of the 2014 International Conference on Computer Science and Electronic Technology, стр. 312-316. Atlantis Press, (января 2015)
R. Hasan, и W. Yurcik. StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability, стр. 1--8. New York, NY, USA, ACM, (2006)
Gokilavani, Ashin, Unnikrishnan, Sunder, и Ajay. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV):
102-107(мая 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..