物联网(英文)最新文献

筛选
英文 中文
Dynamic Clustering Method for the Massive IoT System 海量物联网系统的动态聚类方法
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_48
Yunseok Chang
{"title":"Dynamic Clustering Method for the Massive IoT System","authors":"Yunseok Chang","doi":"10.1007/978-3-030-71017-0_48","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_48","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73399941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Collection and Generation for Radio Frequency Signal Security 射频信号安全的数据采集与生成
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_53
Tarek Youssef, Guillermo A. Francia, H. Sevil
{"title":"Data Collection and Generation for Radio Frequency Signal Security","authors":"Tarek Youssef, Guillermo A. Francia, H. Sevil","doi":"10.1007/978-3-030-71017-0_53","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_53","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79726662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Posteriori Access Control with an Administrative Policy 具有管理策略的后验访问控制
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_19
Farah Dernaika, N. Cuppens-Boulahia, F. Cuppens, Olivier Raynaud
{"title":"A Posteriori Access Control with an Administrative Policy","authors":"Farah Dernaika, N. Cuppens-Boulahia, F. Cuppens, Olivier Raynaud","doi":"10.1007/978-3-030-71017-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_19","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"1998 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90440162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Vehicle Security Model 自动驾驶汽车安全模型
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_37
N. Hazzazi, Kevin Daimi, H. Issa
{"title":"Autonomous Vehicle Security Model","authors":"N. Hazzazi, Kevin Daimi, H. Issa","doi":"10.1007/978-3-030-71017-0_37","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_37","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84927507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive Vehicle Security Metrics 汽车安全指标
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_24
Guillermo A. Francia
{"title":"Automotive Vehicle Security Metrics","authors":"Guillermo A. Francia","doi":"10.1007/978-3-030-71017-0_24","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_24","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75008121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics 基于人工智能和仿真的灾后物流优化决策支持系统
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_18
Gonzalo Barbeito, Dieter Budde, M. Moll, S. Pickl, B. Thiebes
{"title":"A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics","authors":"Gonzalo Barbeito, Dieter Budde, M. Moll, S. Pickl, B. Thiebes","doi":"10.1007/978-3-030-71017-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_18","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87223401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of DBMSs 数据库管理系统的安全性
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_32
S. Amer
{"title":"Security of DBMSs","authors":"S. Amer","doi":"10.1007/978-3-030-71017-0_32","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_32","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77068895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practice of Detecting Insider Threats within a Network 检测网络内部威胁的实践
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_13
Jeong Yang, David Velez, Harry C. Staley, Navin Mathew, Daniel De LeonII
{"title":"A Practice of Detecting Insider Threats within a Network","authors":"Jeong Yang, David Velez, Harry C. Staley, Navin Mathew, Daniel De LeonII","doi":"10.1007/978-3-030-71017-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_13","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"153 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77539935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Piano Player with Embedded Microcontrollers 带有嵌入式微控制器的钢琴播放器
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_55
B. Shaer, Garrick Gressett, Phillip Mitchell, Joshua Meeks, William Barnes, Stone Hewitt
{"title":"Piano Player with Embedded Microcontrollers","authors":"B. Shaer, Garrick Gressett, Phillip Mitchell, Joshua Meeks, William Barnes, Stone Hewitt","doi":"10.1007/978-3-030-71017-0_55","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_55","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82915024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPATIO: end-uSer Protection Against ioT IntrusiOns SPATIO:终端用户防御物联网入侵
物联网(英文) Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-9
G. Mouta, M. Pardal, Joao Bota, M. Correia
{"title":"SPATIO: end-uSer Protection Against ioT IntrusiOns","authors":"G. Mouta, M. Pardal, Joao Bota, M. Correia","doi":"10.1201/9780429270567-9","DOIUrl":"https://doi.org/10.1201/9780429270567-9","url":null,"abstract":"The Internet of Things (IoT) is an emerging technology field where large numbers of physical objects communicate between themselves using Internet technology. IoT solutions are very diverse, ranging from simple toys to industrial applications. There are currently billions of IoT devices connected to the Internet, and this number has been growing exponentially in the recent years. The large amount of data being generated from the many devices in an IoT network makes it difficult to collect and analyse all the data. However, with this growth there also comes a growing security concern. With the use of IoT devices in the industrial and healthcare sectors, for example, a security incident can have far reaching consequences in the real world. It is imperative to detect attacks as fast as possible, in time to prevent significant damage. The continuous flow of data may be handled with a stream processing approach, a data processing paradigm in which highrate data sources are processed and generate results on-thefly. Based on this approach, we propose SPATIO (end-uSer Protection Against ioT IntrusiOns), an anomaly detection system designed for the IoT using machine learning to discover and alert on anomalies happening in an IoT network but takes a fog computing approach by using devices on the IoT network, such as routers, to collect and transform network traffic into flow metrics. Doing this transformation closer to the edge reduces the bandwidth cost on the network and allows anonymization of data before being sent outside the network, to the cloud or a server running outlier detection algorithms to generate timely alerts of network anomalies. We evaluate SPATIO by developing a prototype testing it on an existing public dataset of IoT attacks. We measured the accuracy of the machine learning approach, reaching close to 80% detection rate in the best scenario, and compared the performance of offloading work to gateway devices in the IoT network versus a centralized approach, in which the fog approach shows advantages in both network load as well as attack detection latency.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88811429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信