2016 18th International Conference on Advanced Communication Technology (ICACT) 2016
DOI: 10.1109/icact.2016.7423327
|View full text |Cite
|
Sign up to set email alerts
|

False clouds for Internet of Things and methods of protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…It is clear that the protection system is more effective the smaller the amount of damage (5) and the larger the amount of damage prevented (10). To do this, you should increase the value of the probability i p and reduce the duration of the control procedure ki T  .…”
Section: T T  mentioning
confidence: 99%
See 2 more Smart Citations
“…It is clear that the protection system is more effective the smaller the amount of damage (5) and the larger the amount of damage prevented (10). To do this, you should increase the value of the probability i p and reduce the duration of the control procedure ki T  .…”
Section: T T  mentioning
confidence: 99%
“…that is, it is equal to the maximum possible damage due to the successful implementation of threats, which is reduced by the amount of the maximum possible damage due to an idle network during control. It also follows from expressions ( 7), (10) that it is advisable to apply network protection against threats of any type only when the value of the damage to be prevented is not negative (is greater than zero). For threats of the i-th type, this means that…”
Section: T T  mentioning
confidence: 99%
See 1 more Smart Citation
“…In articles [1] - [5] the authors consider, and below summarize the main features of identification for the Internet of Things, namely: different life cycle of devices; the relationship of the objects of the Internet of Things with other extrasystem entities; special requirements for the context in which the devices operate; requirements for providing protection mechanisms; the ability to expand the identification system to a huge number of devices; ability to work effectively for a variety of devices; transparency of the addressing system and independence from the network; flexible and efficient mechanism for identifier resolution; security and storage of user data, etc.…”
Section: Review Of Publicationsmentioning
confidence: 99%