Cyber‐Assurance for the Internet of Things 2016
DOI: 10.1002/9781119193784.ch2
|View full text |Cite
|
Sign up to set email alerts
|

Cyber‐Assurance Through Embedded Security for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 63 publications
0
4
0
Order By: Relevance
“…Services will be able to interact with these smart ICD"s using standard interfaces that will provide the necessary link via the Internet, to query and change their state and retrieve any information associated with them, taking into account security and privacy issues (Vermesan et al 2011). "Things" can only become context aware, sense, communicate, interact, exchange data, information and knowledge if they are suitably equipped with appropriate object-connected technologies; unless of course they are human "things" or other entities with these intrinsic capabilities (Brooks, 2017). In this vision, using intelligent decision-making algorithms in software applications, appropriate rapid responses can be given to physical phenomena, based on the very latest information collected about physical entities and consideration of patterns in the historical data, either for the same entity or for similar entities (Yan et al 2010;Vermesan et al 2011).…”
Section: Wireless Gridsmentioning
confidence: 99%
“…Services will be able to interact with these smart ICD"s using standard interfaces that will provide the necessary link via the Internet, to query and change their state and retrieve any information associated with them, taking into account security and privacy issues (Vermesan et al 2011). "Things" can only become context aware, sense, communicate, interact, exchange data, information and knowledge if they are suitably equipped with appropriate object-connected technologies; unless of course they are human "things" or other entities with these intrinsic capabilities (Brooks, 2017). In this vision, using intelligent decision-making algorithms in software applications, appropriate rapid responses can be given to physical phenomena, based on the very latest information collected about physical entities and consideration of patterns in the historical data, either for the same entity or for similar entities (Yan et al 2010;Vermesan et al 2011).…”
Section: Wireless Gridsmentioning
confidence: 99%
“…Реалізація: провести навчання та надати ресурси, щоб допомогти користувачам розпізнавати такі загрози, як фішинг, розуміти важливість оновлень та знати, як ефективно використовувати функції безпеки [10].…”
Section: навчання та обізнаність користувачівunclassified
“…Services will be able to interact with these smart ICD's using standard interfaces that will provide the necessary link via the Internet, to query and change their state and retrieve any information associated with them, considering security and privacy issues (Vermesan et al 2011). 'Things' can only become context aware, sense, communicate, interact, exchange data, information and knowledge if they are suitably equipped with appropriate object-connected technologies; unless of course they are human 'things' or other entities with these intrinsic capabilities (Brooks, 2017). In this vision, using intelligent decision-making algorithms in software applications, appropriate rapid responses can be given to physical phenomena, based on the very latest information collected about physical entities and consideration of patterns in the historical data, either for the same entity or for similar entities (Yan et al 2010;Vermesan et al 2011).…”
Section: Wireless Gridsmentioning
confidence: 99%