Xiao et al., 2014
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Swessi et al. | A survey on internet-of-things security: threats and emerging countermeasures | |
| Da Xu et al. | Embedding blockchain technology into IoT for security: A survey | |
| Yahuza et al. | Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities | |
| Jurcut et al. | Introduction to IoT security | |
| US11863434B2 (en) | System and method of providing policy selection in a network | |
| Puthal et al. | SEEN: A selective encryption method to ensure confidentiality for big sensing data streams | |
| Meng et al. | Collaborative security: A survey and taxonomy | |
| Patwary et al. | Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review | |
| Jiasi et al. | Secure software-defined networking based on blockchain | |
| Xiao | Accountability for wireless LANs, ad hoc networks, and wireless mesh networks | |
| Jabraeil Jamali et al. | IoT security | |
| Li et al. | BCTrustFrame: Enhancing trust management via blockchain and IPFS in 6G era | |
| Bou-Harb et al. | Cyber threat intelligence for the internet of things | |
| Xiao et al. | Accountability using flow‐net: design, implementation, and performance evaluation | |
| Xiao et al. | GlobalView: building global view with log files in a distributed/networked system for accountability | |
| Yeh et al. | A collaborative DDoS defense platform based on blockchain technology | |
| Jaigirdar et al. | Risk and compliance in IoT-health data propagation: a security-aware provenance based approach | |
| Amanlou et al. | Cybersecurity challenges in smart grid systems: current and emerging attacks, opportunities, and recommendations | |
| Wang et al. | A data plane security model of SR-BE/TE based on zero-trust architecture | |
| Trivedi et al. | Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS) | |
| CN116827821B (en) | Block chain cloud-based application program performance monitoring method | |
| Li et al. | Network Security | |
| Faraj et al. | Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review | |
| Rull Aixa | Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach | |
| Hamza et al. | Securing IoT networks using formal behavioral modeling and dynamic flow management |