Sie sind auf Seite 1von 6

Survey References

1. W. Venters, E. A. Whitley, A critical review of cloud computing: researching desires and


realities. Journal of Information Technology, 27(3), 179197, 2012.

2. U. Holler, et al., From Machine to Machine to the Internet of Things: Introduction to a


New Age of Intelligence. Waltham: Academic Press, 2014.

3. A. Mohan, "Cyber Security for Personal Medical Devices Internet of Things," 2014 IEEE
International Conference on Distributed Computing in Sensor Systems, Marina Del Rey,
CA, 2014, pp. 372-374. : http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=6846193&isnumber=6846129 doi: 10.1109/DCOSS.2014.49

4. J. Caedo and A. Skjellum, "Adding scalability to Internet of Things gateways using


parallel computation of edge device data," 2016 IEEE High Performance Extreme
Computing Conference (HPEC), Waltham, MA, USA, 2016, pp. 1-5.
doi: 10.1109/HPEC.2016.7761601 http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?
tp=&arnumber=7761601&isnumber=7761574].

5. D. Kune, Ghost talk: Mitigating EMI signal injection attacks


against analog sensors, in Proc. IEEE Symp. Security Privacy,
pp-145-159,May 2013]
6. K. Fu and J. Blum, Inside Risks Controlling for Cybersecurity Risks of Medical Device
Software, Communications of the ACM, Vol. 56, No. 10, October 2013. Online:
http://www.csl.sri.com/users/neumann/cacm231.pdf

7. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care:
A Comprehensive Survey," in IEEE Access, vol. 3, no. , pp. 678-708, 2015.doi:
10.1109/ACCESS.2015.2437951 http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7113786&isnumber=7042252

8. 2net mHealth Platform, Qualcomm Life, Inc. https://developer.qualcomm.com/hardware/2net-


mhealth

9. J. Siddiquee, A. Roy, A. Datta, P. Sarkar, S. Saha and S. S. Biswas, "Smart asthma attack prediction system
using Internet of Things," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile
Communication Conference (IEMCON), Vancouver, BC, Canada, 2016, pp. 1-4.
doi: 10.1109/IEMCON.2016.7746252 http://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=7746252&isnumber=7746074

10. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, "The Internet of Things for Health Care:
A Comprehensive Survey," in IEEE Access, vol. 3, no. , pp. 678-708, 2015.
11. L. Yang, Y. Ge, W. Li, W. Rao, and W. Shen, A home mobile healthcare system for wheelchair users, in
Proc. IEEE Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD), May 2014, pp. 609614.
12. V. Kolici, E. Spaho, K. Matsuo, S. Caballe, L. Barolli, and F. Xhafa, Implementation of a medical support
system considering P2P and IoT technologies, in Proc. 8th Int. Conf. Complex, Intell. Softw. Intensive Syst.
(CISIS), Jul. 2014, pp. 101106

13. M. Zhang, A. Raghunathan, and N. K. Jha, Trustworthiness of medical devices and body area networks,
Proceedings of the IEEE, vol. 102, no. 8, pp. 11741188, 2014. http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/xpls/icp.jsp?arnumber=6827202#at-glance
14. Samuel Gibbs, Google eavesdropping tool installed on computers without permission.
https://www.theguardian.com/technology/2015/jun/23/google-eavesdropping-tool-installed-computers-
without-permission, 2015
15. D. Puthal, S. Nepal, R. Ranjan and J. Chen, "Threats to Networking Cloud and Edge Datacenters in the
Internet of Things," in IEEE Cloud Computing
16. S. Bhasin and F. Regazzoni, A survey on hardware Trojan detection techniques, in Proc. IEEE Int. Symp.
Circuits and Systems, 2015, pp. 20212024.
17. A. M. Nia, S. Sur-Kolay, A. Raghunathan, and N. K. Jha, Physiological information leakage: A new frontier
in health information security, accepted for publication in IEEE Trans. Emerging Topics in Computing
18. H. Li, Y. He, L. Sun, X. Cheng and J. Yu, "Side-channel information leakage of encrypted video stream in
video surveillance systems," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on
Computer Communications, San Francisco, CA, 2016, pp. 1-9. doi: 10.1109/INFOCOM.2016.7524621
19. X. Duan, Q. Cui, S. Wang, H. Fang and G. She, "Differential power analysis attack and efficient
countermeasures on PRESENT," 2016 8th IEEE International Conference on Communication Software and
Networks (ICCSN), Beijing, 2016, pp. 8-12. doi: 10.1109/ICCSN.2016.7586627.
20. A. A. Patel and S. J. Soni, "A Novel Proposal for Defending against Vampire Attack in WSN," 2015 Fifth
International Conference on Communication Systems and Network Technologies, Gwalior, 2015, pp. 624-
627.
21. D. Kaur and R. Singh Energy level based Hello Flood attack Mitigation on WSN, 2015, IJESC
22. Y. Li, L. Zhou, H. Zhu and L. Sun, "Privacy-Preserving Location Proof for Securing Large-Scale Database-
Driven Cognitive Radio Networks," in IEEE Internet of Things Journal, vol. 3, no. 4, pp. 563-571, Aug.
2016.
23. A. P. Johnson, S. Patranabis, R. S. Chakraborty and D. Mukhopadhyay, "Remote Dynamic Clock
Reconfiguration Based Attacks on Internet of Things Applications," 2016 Euromicro Conference on Digital
System Design (DSD), Limassol, 2016, pp. 431-438.

24. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, IMDGuard: Securing implantable medical devices with the
external wearable guardian, in Proc. IEEE Int. Conf. Comput. Commun., Apr. 2011, pp. 18621870
25. doi: 10.1109/JIOT.2015.2481926

Palgrave Macmillan

M. Semilof. (1996, July). Driving commerce to the web-corporate intranets and the internet: lines blur.
Communication Week [Online]. vol. 6, issue 19. Available: http://www.techweb.com/se/directlinkcgi?
CWK19960715S0005

Venters, Will and Whitley, Edgar A. (2012) A critical review of cloud computing: researching desires and
realities. Journal of Information Technology, 27 (3). pp. 179-197. ISSN 0268-3962

Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos, Detection of Sinkhole Attacks for
Supporting Secure Routing on 6LoWPAN for Internet of Things http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?arnumber=7140344
START AFTER MEETING

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7423655/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7210391/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6332046/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/962536/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7380537/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6821532/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7761601/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7746252/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7737142/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7733684/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7723583/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7503493/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7461513/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7384232/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7129976/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7093020/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6868197/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7093020/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849970/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6271291/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7411833/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7762123/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7753621/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7740440/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745310/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745481/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7745830/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7746067/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7733119/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7724728/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7724916/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7579107/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7575858/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7566473/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7568958/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7560864/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7563449/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7546519/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7544364/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7543884/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7538981/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7529088/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7523532/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7518650/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7510833/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7510811/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7503989/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7497199/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7498684/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7471235/http://0-
ieeexplore.ieee.org.brum.beds.ac.uk/document/7473054/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7467343/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7155463/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7457159/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7454499/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7444889/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7430504/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7427903/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7423328/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7424628/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7420545/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7405613/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7328145/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7307037/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7167238/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7106364/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6702439/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7001385/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849186/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6849256/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6718523/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6505979/
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7544364/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7437601/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7412058/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7389813/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7684756/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7546225/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7539245/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7459120/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7453776/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7758259/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7308171/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7005393/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7196499/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7021016/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/6300573/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/5766526/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/1499204/

http://0-ieeexplore.ieee.org.brum.beds.ac.uk/document/7562763/

Das könnte Ihnen auch gefallen